Check Point Reference: | CPAI-2015-0589 |
Date Published: | 21 May 2015 |
Severity: | High |
Last Updated: | Wednesday 25 May, 2016 |
Source: | Asterisk Squid Project AST-2015-003 Squid Project |
Industry Reference: | CVE-2015-3008 CVE-2015-3455 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Asterisk Asterisk Open Source prior to 1.8.32.3 Asterisk Asterisk Open Source prior to 11.17.1 Asterisk Asterisk Open Source prior to 12.8.2 Asterisk Asterisk Open Source prior to 13.3.2 Asterisk Certified Asterisk prior to 1.8.28-cert5 Asterisk Certified Asterisk prior to 11.6-cert11 Asterisk Certified Asterisk prior to 13.1-cert2 Squid Project Squid prior to 3.2.14 Squid Project Squid prior to 3.3.14 Squid Project Squid prior to 3.4.13 Squid Project Squid prior to 3.5.4 |
Vulnerability Description | A policy bypass vulnerability exists in multiple products. The vulnerability is due to incorrectly validating the common name in a certificate. It can be exploited by using a NULL character after the portion of the common name that the product expects. By exploiting this vulnerability, a remote attacker can conduct a variety of attacks including man-in-the-middle. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SSL Enforcement Violation.
Attack Information: Multiple Vendors TLS Certificate Common Name NULL Byte Input Validation Error