Lucene search

K
symantecSymantec Security ResponseSMNTC-1467
HistoryNov 28, 2018 - 8:01 a.m.

Linux Kernel Aug 2017 - Sep 2018 Vulnerabilities

2018-11-2808:01:01
Symantec Security Response
28

0.954 High

EPSS

Percentile

99.4%

SUMMARY

Symantec Network Protection products that include a vulnerable version of the Linux kernel are susceptible to multiple vulnerabilities. A remote attacker, with access to the management interface, can obtain unauthorized read/write access to local files, cause denial of service, and possible execute arbitrary code.

AFFECTED PRODUCTS

Advanced Secure Gateway (ASG)

CVE |Supported Version(s)|Remediation
CVE-2018-5390 | 6.6 | Upgrade to later release with fixes.
6.7 | Upgrade to 6.7.4.8.
7.1 | Upgrade to later release with fixes.
7.2 | Not vulnerable, fixed

Content Analysis (CA)

CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 1.3, 2.1, 2.2, 2.3 | Upgrade to later version with fixes.
2.4, 3.0 | Not available at this time
3.1 | Not vulnerable, fixed in 3.1.0.0.

Director

CVE |Supported Version(s)|Remediation
CVE-2017-18017, CVE-2018-5390,
CVE-2018-5391 | 6.1 | Upgrade to a version of MC with the fixes.

Malware Analysis (MA)

CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 4.2 | Upgrade to a version of Content Analysis with fixes.

Mail Threat Defense (MTD)

CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 1.1 | Upgrade to a version of CAS and SMG with the fixes.

Management Center (MC)

CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 2.0 - 2.4 | Upgrade to later release with fixes.
3.0 and later | Not vulnerable, fixed in 3.0.1.1

PacketShaper (PS) S-Series

CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 11.6, 11.9, 11.10 | A fix will not be provided. Allot Secure Services Gateway (SSG) is a replacement product for PS S-Series. Switch to a version of SSG with the vulnerability fixes.

PolicyCenter (PC) S-Series

CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 1.1 | A fix will not be provided. Allot NetXplorer is a replacement product for PC S-Series. Switch to a version of NetXplorer with the vulnerability fixes.

ProxySG

CVE |Supported Version(s)|Remediation
CVE-2018-5390 | 6.5, 6.6 | Upgrade to later release with fixes.
6.7 | Upgrade to 6.7.4.8.
7.1 | Upgrade to later release with fixes.
7.2 | Not vulnerable, fixed in 7.2.0.1.

Reporter

CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 9.5 | Not vulnerable
10.1, 10.2, 10.3, 10.4 | Upgrade to later release with fixes.
10.5 | Not vulnerable, fixed in 10.5.1.1.

Security Analytics

CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 7.2, 7.3, 8.0 | Upgrade to later release with fixes.
8.1 | Not vulnerable, fixed in 8.1.1.

SSL Visibility (SSLV)

CVE |Supported Version(s)|Remediation
CVE-2018-5390 | 3.10, 3.11, 3.12, 5.0 | Upgrade to later release with fixes.
4.2, 4.3, 4.4 | Not vulnerable
4.5 | Not available at this time
5.2 | Not vulnerable, fixed in 5.2.1.1.
CVE-2018-5391 | 3.10, 3.11, 3.12, 4.2, 4.3, 4.4, 5.0 | Upgrade to later release with fixes.
4.5 | Not available at this time
5.2 | Not vulnerable, fixed in 5.2.1.1.

X-Series XOS

CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 10.0, 11.0 | A fix will not be provided.

ADDITIONAL PRODUCT INFORMATION

The following products are not vulnerable:
AuthConnector
BCAAA
CacheFlow
Cloud Data Protection for ServiceNow
Cloud Data Protection for Oracle CRM On Demand
Cloud Data Protection Integration Server
Cloud Data Protection Communication Server
General Auth Connector Login Application
HSM Agent for the Luna SP
IntelligenceCenter
IntelligenceCenter Data Collector
PacketShaper PolicyCenter ProxyAV ProxyAV ConLog and ConLogXP **Unified Agent
Web Isolation
WSS Mobile Agent

**

ISSUES

CVE-2017-13715

Severity / CVSSv3 | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| SecurityFocus: BID 100517 / NVD: CVE-2017-13715 Impact| Denial of service, code execution Description | A flaw in internal state initialization allows a remote attacker to send a crafted MPLS packet and cause denial of source through a system crash, or possibly execute arbitrary code.

CVE-2017-1000251

Severity / CVSSv3 | High / 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| SecurityFocus: BID 100809 / NVD: CVE-2017-1000251 Impact| Code execution Description | A flaw in L2CAP configuration responses in the native Bluetooth stack allows a remote attacker to send crafted responses and execute arbitrary code.

CVE-2017-18017

Severity / CVSSv3 | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| SecurityFocus: BID 102367 / NVD: CVE-2017-18017 Impact| Denial of service Description | A flaw in TCPMSS firewall target processing allows a remote attacker to send crafted packets and cause denial of service or unspecified other impact.

CVE-2018-5390 (SegmentSmack)

Severity / CVSSv3 | High / 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) References| SecurityFocus: BID 104976 / NVD: CVE-2018-5390 Impact| Denial of service Description | A flaw in TCP fragment reassembly allows a remote attacker to send crafted TCP fragments and cause denial of service through CPU exhaustion.

CVE-2018-5391 (FragmentSmack)

Severity / CVSSv3 | High / 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) References| SecurityFocus: BID 105108 / NVD: CVE-2018-5391 Impact| Denial of service Description | A flaw in IP fragment reassembly allows a remote attacker to send crafted IP fragments and cause denial of service.

CVE-2018-5703

Severity / CVSSv3 | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| NVD: CVE-2018-5703 Impact| Denial of service Description | A flaw in the TLS implementation allows a remote attacker to send crafted packets and cause a system crash, resulting in denial of service.

CVE-2018-1000028

Severity / CVSSv3 | High / 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) References| NVD: CVE-2018-1000028 Impact| Security control bypass Description | A flaw in NFS access control allows a remote attacker to get unauthorized read/write access to local files.

CVE-2018-10938

Severity / CVSSv3 | Medium / 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) References| SecurityFocus: BID 105154 / NVD: CVE-2018-10938 Impact| Denial of service Description | A flaw in packet handling allows a remote attacker to send crafted packets and cause denial of service through an infinite loop.

CVE-2018-14641

Severity / CVSSv3 | Medium / 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) References| NVD: CVE-2018-14641 Impact| Denial of service Description | A flaw in IP fragment reassembly allows a remote attacker to send crafted IP fragments and cause denial of service.

REVISION

2021-07-20 A fix for SSLV 4.4 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2021-07-15 A fix for Security Analytics 7.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2021-06-07 A fix for SSLV 3.10, SSLV 3.12, and SSLV 5.0 will not be provided. Please upgrade to a later version with the vulnerability fixes. SSLV 5.2 is not vulnerable because a fix is available in 5.2.1.1.
2021-02-18 A fix for CA 2.3 and MC 2.4 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-11-30 MC 3.0 is not vulnerable because a fix is available in 3.0.1.1.
2020-11-19 A fix for MTD 1.1 will not be provided. Please upgrade to a version of CAS and SMG with the vulnerability fixes. A fix for SA 7.3 and 8.0 will not be provided. Please upgrade to a later version with the vulnerability fixes. A fix for XOS 9.7, 10.0, and 11.0 will not be provided. A fix for Director 6.1 will not be provided. Please upgrade to a version of MC with the vulnerability fixes. A fix for Reporter 10.4 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-11-12 Content Analysis 3.1 is not vulnerable because a fix is available in 3.1.0.0.
2020-08-19 A fix for MC 2.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-04-30 A fix will not be provided for ProxySG 6.5. Please upgrade to a later version with the vulnerability fixes.
2020-04-08 Content Analysis 3.0 is vulnerable to CVE-2018-5391. Reporter 10.5 is not vulnerable because a fix is available in 10.5.1.1. Security Analytics 8.1 is not vulnerable because a fix is available in 8.1.1. Fixes will not be provided for Management Center 2.2 and Reporter 10.3. Please upgrade to later versions with the vulnerability fixes.
2020-04-04 A fix for PacketShaper S-Series will not be provided. Allot Secure Services Gateway (SSG) is a replacement product for PacketShaper S-Series. Switch to a version of SSG with the vulnerability fixes. A fix for PolicyCenter S-Series will not be provided. Allot NetXplorer is a replacement product for PolicyCenter S-Series. Switch to a version of NetXplorer with the vulnerability fixes.
2020-01-28 A fix will not be provided for ASG 7.1 and ProxySG 7.1. Please upgrade to a later version with the vulnerability fix. ASG and ProxySG 7.2 are not vulnerable because fixes are available in 7.2.0.1 EA.
2020-01-19 A fix will not be provided for Malware Analysis. Please upgrade to a version of Content Analysis with the vulnerability fixes. PacketShaper and ProxyAV are not vulnerable.
2019-10-02 Web Isolation is not vulnerable.
2019-09-05 A fix for MC 2.1 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-30 Reporter 10.4 is vulnerable to CVE-2018-5390 and CVE-2018-5391.
2019-08-19 CA, MTD, MC, Reporter 10.x, and SSLV 4.2-4.4 are not vulnerable to CVE-2018-5390. SSLV 3.12 and 4.5 are vulnerable to CVE-2018-5390 and CVE-2018-5391. CA 2.4 is vulnerable to CVE-2018-5391.
2019-08-13 MC 2.2 and MC 2.3 are vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix for MC 2.0 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-07 A fix for ASG 6.6 and ProxySG 6.6 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-06 A fix for Reporter 10.1 and 10.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-06 A fix for SSLV 4.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-07-25 It was previously reported that a fix for CVE-2018-5390 in ASG 6.7 is available in 6.7.4.141 EA. Further investigation has shown that ASG 6.7.4.141 EA is still vulnerable. A fix for CVE-2018-5390 in ASG 6.7 and ProxySG 6.7 is available in 6.7.4.8. ASG and ProxySG are not vulnerable to CVE-2018-5391.
2019-02-04 A fix for CA 1.3 and CA 2.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-01-18 SSLV 5.0 is vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix for SSLV 3.11 and 4.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-01-14 Reporter 10.3 is vulnerable to CVE-2018-5390 and CVE-2018-5391.
2019-01-13 SSLV 3.x and 4.x are vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix is not available at this time.
2019-01-11 A fix for CA 2.1 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2018-11-28 initial public release