Вы находитесь на странице: 1из 15

Vulnerabilities Report

Release 7.5
FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United
States and other countries. All other trademarks are the property of their respective
owners.
FireEye assumes no responsibility for any inaccuracies in this document. FireEye reserves
the right to change, modify, transfer, or otherwise revise this publication without notice.
Copyright © 2015 FireEye, Inc. All rights reserved.

Vulnerabilities Report
Release 7.5
Version 4

FireEye Contact Information:


Website: www.fireeye.com
Support Email: support@fireeye.com
Phone:
United States: 877.FIREEYE (877.347.3393)
United Kingdom: 44.203.106.4828
Other: 408.321.6300
CONTENTS

Introduction 1
Scan Parameters 1

Vulnerability Summary 2
Vulnerability Summary from Previous Releases 2

Vulnerability Details 4
High-Level Vulnerabilities 5

Medium-Level Vulnerabilities 7

References 12

© 2015 FireEye i
Release 7.5 Introduction

Introduction
This document provides an explanation of the findings in the vulnerability scan reports generated
via the QualysGuard Security Scanner product version 7.11.20-1. This document also includes
findings that were collected via manual analysis and field reports.

In the scan reports generated by QualysGuard, SNMP versions 1 and 2 are supported
for backward compatibility. However, SNMP version 3 needs to be used for authen-
tication.
CVE-2014-9295 has already been patched.
CVE-2015-0235 has already been patched.
These vulnerabilities have been addressed in version 7.5.1. To patch these
vulnerabilities for release 7.4.x and earlier, download hotfix images from FireEye
Technical Support. The hotfix ensures that the current installed binary is patched and
not vulnerable to an attack, as described in the CVEs. For backward compatibility, the
version number is not changed. Common vulnerability assessment tools and scanners,
which validate binary version numbers, might report that FireEye is still vulnerable to
these CVEs after the hotfix images are applied.

Scan Parameters
Scanner QualysGuard Security Scanner

Scanner Version 7.11.20-1

Audit Revision 2478

Audit Group(s) All Audits

<more test parameters> Ports: Common, HTTP, NetBIOS

Options: All

Credentials: admin

FireEye Product Version 7.5.0

Appliance Types FireEye NX Series

FireEye EX Series

FireEye FX Series

FireEye AX Series

FireEye CM Series

© 2015 FireEye 1
Release 7.5 Vulnerability Summary

Vulnerability Summary
Vulnerability Severity Related CVE-IDs Validity
Apache HTTPD Server Version Out Of Date High CVE-1999-0662 Not Valid

Apache HTTP Server Multiple Vul- High CVE-2013-1862 Not Valid


nerabilities (20130722) - Remote
CVE-2013-1896 Not Valid

CVE-2013-2249 Valid but FireEye


invulnerable

HTTP TRACE/TRACK Method Supported Medium CVE-2003-1567 Not Valid

CVE-2004-2320 Not Valid

CVE-2007-3008 Not Valid

CVE-2010-0386 Not Valid

Apache Reverse Proxy Crafted URI Medium CVE-2011-3368 Not Valid


Request Information Disclosure - Banner
CVE-2011-4317 Not Valid

Apache Multiple Vulnerabilities (20120131) Medium CVE-2012-0053 Not Valid


- Banner - TCP:80
CVE-2012-0031 Not Valid

CVE-2012-0021 Valid but FireEye


invulnerable

Apache Mod_SetEnvIf .htaccess Privilege Medium CVE-2011-3607 Not Valid


Escalation

Vulnerability Summary from Previous Releases


Related CVE-
Vulnerability Severity Validity
IDs
OpenSSH - Separation verification weakness High CVE-2006-5794 Not Valid

OpenSSH - x11 cookie privilege escalation High CVE-2007-4752 Not Valid

OpenSSH - Remote DOS Medium CVE-2006-4925 Valid but FireEye invul-


nerable

OpenSSH - Mac OS X DOS Medium CVE-2007-0726 Not Valid

© 2015 FireEye 2
Vulnerabilities Report

Related CVE-
Vulnerability Severity Validity
IDs
OpenSSH - System Account Enumeration if Medium CVE-2007-2243 Valid but FireEye invul-
S/KEY is used nerable

3 © 2015 FireEye
Release 7.5 Vulnerability Details

Vulnerability Details
Vulnerabilities fall into two classifications:
l High-level vulnerabilities
l Medium-level vulnerabilities

© 2015 FireEye 4
Release 7.5

High-Level Vulnerabilities
The following vulnerabilities are considered high level:
l Apache HTTPD Server Version Out Of Date
l Apache HTTP Server Multiple Vulnerabilities (20130722) - Remote

Apache HTTPD Server Version Out Of Date Vulnerability - High


Audit ID 3872

Risk Level High

Overall PCI Security Level High

Overall PCI Compliance Fail


Status

Highest CVSS Score 10 [AV:N/AC:L/Au:N/C:C/I:C/A:C]

Category Web Servers

Description The Apache HTTPD Server version detected on this system has been found
to be out of date. Versions that have not been updated after an excessive
time period could be susceptible to vulnerabilities that would otherwise be
resolved by upgrading to a newer version.

Audit 3872 and Audit 15585 are designed for Apache ver-
sions from Apache.org and may report false findings on
vendor-specific Apache backports.

How To Fix Upgrade to the latest Apache HTTPD Server version available.

Related Links Apache Archives

Related CVE Breakdown CVE-ID CVSS Score PCI Severity PCI Status

CVE-1999- 10 High CVSS Score) Fail


0662

Exploits CVE-ID Exploit Database Core Impact Metasploit

CVE-1999- No No No
0662

Validity Not valid

FireEye Response FireEye patched our version to the latest available security.

© 2015 FireEye 5
Vulnerabilities Report

Apache HTTP Server Multiple Vulnerabilities (20130722) - High


Audit ID 19748

Risk Level Medium

Overall PCI High


Severity Level

Overall PCI Fail


Compliance
Status

Highest CVSS 7.5 [AV:N/AC:L/Au:N/C:P/I:P/A:P]


Score

Category Web Servers

Description Apache HTTP Server contains multiple vulnerabilities when handling a crafted URI in
'mod_dav_svn' function and the 'dirty flag' when saving sessions. Successful exploitation
may allow a remote attacker to create denial-of-service conditions or potentially lead to a
compromise of the target system.

How To Fix Update the Apache HTTP Server to version 2.4.6, 2.2.25 or later.

Related CVE CVE-ID CVSS Score PCI Severity PCI Status


Breakdown
CVE-2013-1862 5.1 Medium (CVSS Score) Fail

CVE-2013-1896 4.3 Low (Denial of Service) Pass

CVE-2013-2249 7.5 High (CVSS Score) Fail

Exploits CVE-ID Exploit Database Core Impact Metasploit

CVE-2013-1862 No No No

CVE-2013-1896 No No No

CVE-2013-2249 No No No

Validity CVE-2013-1862 is not valid.

CVE-2013-1896 is not valid

CVE-2013-2249 is valid.

FireEye CVE-2013-1862 has already been patched.


Response
CVE-2013-1896 has already been patched.

For CVE-2013-2249, FireEye is not vulnerable because we do not use the mod_session_
dbd module.

6 © 2015 FireEye
Release 7.5

Medium-Level Vulnerabilities
The following vulnerabilities are considered medium level:
l HTTP TRACE/TRACK Method Supported
l Apache Reverse Proxy Crafted URI Request Information Disclosure - Banner
l Apache Multiple Vulnerabilities (20120131) - Banner - TCP:80
l Apache Mod_SetEnvIf .htaccess Privilege Escalation

HTTP TRACE/TRACK Method Supported Vulnerability - Medium


Audit ID 1329

Risk Level Information

Overall PCI Severity Medium


Level

Overall PCI Com- Fail


pliance Status

Highest CVSS 5.8 [AV:N/AC:M/Au:N/C:P/I:P/A:N]


Score

Category Web Servers

Description Retina has discovered that the target host supports the HTTP TRACE method (or the IIS
equivalent HTTP TRACK method). This method is known to allow attackers to gain
access to sensitive information such as cookies and authentication data.

How To Fix It is recommended that the TRACE method be disabled to prevent unauthorized dis-
closure of information.

Related CVE Break- CVE-ID CVSS Score PCI Severity PCI Status
down
CVE-2003- 5.8 Medium (CVSS Score) Fail
1567
5.8 Medium (CVSS Score) Fail
CVE-2004-
4.3 Medium (CVSS Score) Fail
2320
4.3 Medium (CVSS Score) Fail
CVE-2007-
3008

CVE-2010-
0386

© 2015 FireEye 7
Vulnerabilities Report

Exploits CVE-ID Exploit Database Core Impact Metasploit

CVE-2003- No No No
1567
No No No
CVE-2004-
No No No
2320
No No No
CVE-2007-
3008

CVE-2010-
0386

Validity Not valid

FireEye Response FireEye does not support Microsoft Internet Information Services (IIS), BEA WebLogic
Server and Express, Mbedthis AppWeb, or Sun Java System Application Server.

Apache Reverse Proxy Crafted URI Request Information Disclosure


- Medium

Audit ID 15366

Risk Level Medium

Overall PCI Medium


Severity Level

Overall PCI Fail


Compliance
Status

Category Web Servers

Description Apache contains a vulnerability handling crafted URI requests when using mod_proxy in
reverse proxy mode with certain configurations. Successful exploitation could allow an
attacker to connect to an arbitrary server, leveraging existing trust relationships to access
sensitive information from internal web servers not directly accessible to the attacker.

How To Fix Upgrade Apache to version 2.2.22, 2.0.65, or newer.

Related Link Apache HTTP Server - Release Announcement


Apache Release Announcement - 2.2.22-dev
Red Hat Security Advisory - RHSA-2011-1391
Red Hat Security Advisory - RHSA-2011-1392
Red Hat Security Advisory - RHSA-2012-0128

8 © 2015 FireEye
Release 7.5

Related CVE CVE-ID CVSS Score PCI Severity PCI Status


Breakdown
CVE-2011-3368 5 Medium (CVSS Score) Fail

CVE-2011-4317 4.3 Medium (CVSS Score) Fail

BugtraqID 49957
50802

Exploits CVE-ID Exploit Database Core Impact Metasploit

CVE-2011-3368 Yes No No

CVE-2011-4317 No No No

Validity Not valid

FireEye Already patched


Response

Apache Multiple Vulnerabilities (20120131) - Banner - Medium


Audit ID 15889

Risk Level Medium

Overall PCI Severity Medium


Level

Overall PCI Com- Fail


pliance Status

Highest CVSS Score 4.6 [AV:L/AC:L/Au:N/C:P/I:P/A:P]

Category Web Servers

Description Apache 2.2 contains multiple vulnerabilities when constructing 400 error documents,
when handling format strings in cookies, and when handling unspecified fields in
scoreboard shared memory. Successful exploitation may result in disclosure of
'httpOnly' cookies and denial of service conditions.

How To Fix Upgrade Apache to version 2.2.22 or newer.

Related Links Apache HTTP Server - Release Announcement


Apache httpd 2.2 Vulnerabilities

© 2015 FireEye 9
Vulnerabilities Report

Related CVE CVE-ID CVSS Score PCI Severity PCI Status


Breakdown
CVE-2012- 2.6 Low (Denial of Service) Pass
0021
4.6 Medium (CVSS Score) Fail
CVE-2012-
4.3 Medium (CVSS Score) Fail
0031

CVE-2012-
0053

BugtraqID 51407
51705
51706

Exploits CVE-ID Exploit Database Core Impact Metasploit

CVE-2012- No No No
0021
No No No
CVE-2012-
Yes No No
0031

CVE-2012-
0053

Validity CVE-2012-0021 is valid.

CVE-2012-0031 is not valid.

CVE-2012-0053 is not valid.

FireEye Response For CVE-2012-0021, FireEye is not vulnerable because the issue does not affect this
version.

CVE-2012-0031 has already been patched.

CVE-2012-0053 has already been patched.

Apache Mod_SetEnvIf .htaccess Privilege Escalation Vulnerability -


Medium
Audit ID 15584

Risk Level Medium

Overall PCI Severity Medium


Level

Overall PCI Com- Fail


pliance Status

10 © 2015 FireEye
Release 7.5

Highest CVSS Score 4.4 [AV:L/AC:M/Au:N/C:P/I:P/A:P]

Category Web Servers

Description Apache contains an integer overflow vulnerability in the ap_pregsub function in


server/util.c when handling a crafted SetEnvIf directive in conjunction with a crafted
HTTP request header and mod_setenvif is enabled. Successful exploitation could
allow a local attacker to execute arbitrary code with elevated privileges.

How To Fix Upgrade Apache to version 2.2.22 or newer.

Related Links Apache HTTP Server - Release Announcement


IBM ISS Xforce Advisory - 71093

Related CVE Break- CVE-ID CVSS Score PCI Severity PCI Status
down
CVE-2011-3607 4.4 Medium (CVSS Score) Fail

BugtraqID 50494

Exploits CVE-ID Exploit Database Core Impact Metasploit

CVE-2011-3607 No No No

Validity Not valid

FireEye Response Already patched

© 2015 FireEye 11
Release 7.5 References

References
l QualysGuard Vulnerability Scan report for FireEye NX Series
l QualysGuard Vulnerability Scan report for FireEye EX Series
l QualysGuard Vulnerability Scan report for FireEye AX Series
l QualysGuard Vulnerability Scan report for FireEye FX Series
l QualysGuard Vulnerability Scan report for FireEye CM Series

© 2015 FireEye 12

Вам также может понравиться