OpenSSL Security Advisory [22 Sept 2016]

Summary

The OpenSSL project released an advisory on Sept 22nd, 2016, describing 1 High, 1 Medium and 12 Low severity vulnerabilities, as listed below: * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) * SSL_peek() hang on empty record (CVE-2016-6305) * SWEET32 Mitigation (CVE-2016-2183) * OOB write in MDC2_Update() (CVE-2016-6303) * Malformed SHA512 ticket DoS (CVE-2016-6302) * OOB write in BN_bn2dec() (CVE-2016-2182) * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) * Pointer arithmetic undefined behaviour (CVE-2016-2177) * Constant time flag not preserved in DSA signing (CVE-2016-2178) * DTLS buffered message DoS (CVE-2016-2179) * DTLS replay protection DoS (CVE-2016-2181) * Certificate message OOB reads (CVE-2016-6306) * Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307) * Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)

Affected Products

FortiOS versions 5.4.1, 5.4.0, 5.2.9 and below are impacted by CVEs:
* 2016-2177
* 2016-2178
* 2016-2179
* 2016-2180
* 2016-2181
* 2016-2182
* 2016-2183
* 2016-6302
* 2016-6303
* 2016-6304
* 2016-6306
FortiAnalyzer versions 5.4.1, 5.4.0, 5.2.9 and below are impacted by CVEs:
* 2016-2177
* 2016-2178
* 2016-2179
* 2016-2181
* 2016-2182
* 2016-2183
* 2016-6302
* 2016-6303
* 2016-6304
* 2016-6305
* 2016-6306
* 2016-6307
* 2016-6308
FortSwitch versions 3.5.0 and below are impacted by CVEs:
* 2016-2177
* 2016-2179
* 2016-2180
* 2016-2181
* 2016-2182
* 2016-6302
* 2016-6303
* 2016-6304
* 2016-6305
* 2016-6306
* 2016-6307
* 2016-6308
FortiAP versions 5.4.1 and below are impacted by all CVEs included in the OpenSSL Advisory

Solutions

For FortiOS: Upgrade to firmware version 5.2.10 or 5.4.2 or 5.6.0

For FortiAnalyzer: Upgrade to firmware version 5.2.10 or 5.4.2 or 5.6.0

For FortiSwitch: Upgrade to firmware version 3.5.1

For FortiAP: Upgrade to firmware version 5.4.2