Here is an update on SSL 3.0 POODLE and TLS POODLE vulnerability.

1. SSL 3.0 “POODLE” Security Vulnerability -- CVE-2014-3566 

Please refer to the BMC support site link 
  
http://www.bmc.com/support/support-news/SSL_3_0_POODLE_Security_Vulnerability_CVE_2014_3566.html
 
for information about BMC product's update on the SSL 3.0 "POODLE" Security 
vulnerability.

Information specifically relevant for for BMC Remedy AR System and ITSM Suite 
7.6.04, 8.0, and 8.1 and 8.8 is as follows:
A. See support article 
https://kb.bmc.com/infocenter/index?page=content&id=S:KA418664 for instructions 
for disabling SSL V3 in Tomcat used
    by Mid-Tier. 
B. If you are using the LDAP integration plug-in, BMC recommends consulting 
your LDAP Server documentation for turning off SSL V3 in your LDAP Server.
    An LDAP plug-in hotfix to allow the LDAP plug-in to use TLS for 
communication with LDAP Server will be available by January 31, 2015. 

2. TLS POODLE issue with load balancers 

- There is a newly reported TLS POODLE vulnerability. 
   Please refer to 
https://community.qualys.com/blogs/securitylabs/2014/12/08/poodle-bites-tls
- There is a new Critical Vulnerability reported for this issue on F5 load 
balancers in the MITRE vulnerability database.
   It appears that F5 load balancer is vulnerable to this TLS POODLE 
vulnerability. 
  Please refer https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8730
- F5 has reacted immediately and posted a hot fix. 
  Please refer 
https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html
- It is important to apply the F5 hot fix in case you are using a F5 load 
balancer.
- In case you are using any other load balancer, check with your load balancer 
vendor if it suffers from the TLS POODLE vulnerability 
  and if so get a hoxtfix from your load balancer vendor. 
  Please refer to https://www.imperialviolet.org/2014/12/08/poodleagain.html 
which lists other load balancer vendors affected by this vulnerability.
- Use the SSL Labs SSL Server Test tool https://www.ssllabs.com/ssltest/ to 
check your Server for SSL related vulnerabilities.

Regards
--- Abhijit Rajwade

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to