what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

HP Security Bulletin HPSBGN03536 1

HP Security Bulletin HPSBGN03536 1
Posted Jan 26, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03536 1 - Security vulnerabilities in the OpenSSL library could potentially impact HPE IceWall products resulting in local or remote Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, remote, denial of service, local, vulnerability
advisories | CVE-2015-3194, CVE-2015-3195, CVE-2015-3196
SHA-256 | 2b99681ebceb60a46689371fde54d86a3e769390a65f85b7ce1aa4c7cd8a15f5

HP Security Bulletin HPSBGN03536 1

Change Mirror Download
Hash: SHA1

Note: the current version of the following document is available here:


Document ID: c04944173
Version: 1

HPSBGN03536 rev.1 - HP IceWall Products running OpenSSL, Remote and Local
Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-01-22
Last Updated: 2016-01-22

Potential Security Impact: Denial of Service (DoS), Remote Denial of Service

Source: Hewlett Packard Enterprise, Product Security Response Team

Security vulnerabilities in the OpenSSL library could potentially impact HPE
IceWall products resulting in local or remote Denial of Service (DoS).


- CVE-2015-3194 (Certificate verify crash with missing PSS parameter)
- CVE-2015-3195 (X509_ATTRIBUTE memory leak)
- CVE-2015-3196 (Certificate verify crash with missing PSS parameter)
- PSRT110014

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Impacted CVEs

IceWall MCRP 3.0

IceWall MCRP 3.0 (HP-UX only)

IceWall SSO Agent Option 10.0
CVE-2015-3194, CVE-2015-3195

IceWall SSO Agent Option 10.0 (RHEL7 or HP-UX only)

IceWall SSO Certd 10.0

IceWall SSO Dfw 10.0
CVE-2015-3194, CVE-2015-3195


CVSS 2.0 Base Metrics
Reference Base Vector Base Score
CVE-2015-3194 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2015-3195 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2015-3196 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002


HPE recommends applying the latest OS vendor security patches for OpenSSL to
resolve the vulnerabilities for HP IceWall Products.

HP IceWall SSO Dfw 10.0 and Certd 10.0, which are running on RHEL, could be
using either the OS bundled OpenSSL library or the OpenSSL bundled with HP
IceWall. If still using the OpenSSL bundled with HP IceWall, please apply the
latest OS vendor security patches for OpenSSL and switch to the OpenSSL
library bundled with the OS.

Documents are available at the following location with instructions to switch
to the OS bundled OpenSSL library:


Please note that the HP IceWall product is only available in Japan.

Version:1 (rev.1) - 22 January 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

Version: GnuPG v1

Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    9 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By