Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

OpenSSL vulnerability in XG 16.1.1

I have been receiving many IPS entries for "OpenSSL TLSEXT_TYPE_status_request Memory Leak Denial of Service" from many different clients. According to the CVE, versions 1.0.2i contains the patch for the vulnerability. From what I can tell, Sophos XG 16.1.1 uses OpenSSL version 1.0.2e which has the vulnerability CVE-2016-6304 . Any one else having issues? What about getting a patch for this from Sophos?

Regards,

Gary



This thread was automatically locked due to age.
Parents
  • Thanks, but could You write how to fix this issue? Any ideas? What should I do? It's very strange. Till yesterday i haven't any problems with my XG firewall :/

    I have IPS entries "OpenSSL TLSEXT_TYPE_status_request Memory Leak Denial of Service" from windows 10 and android clients.

  • Check the systems if they are using that Openssl Version and if they are vulnerable. In the case, they are not even using the OpenSSl, edit the IPS rule you are using and then remove the OpenSSL TLSEXT_TYPE......from the rule.

    If you are using the default rule, they cannot be edit, so clone it and adjust it.

    Thanks

  • Hey, before I read your answer, I had manually updated patterns to: 

    IPS and Application signatures
    3.13.00
    -
    14:35:15, Oct 22 2016
    Success

    and restarted the UTM.

    Now when I go to IPS policy, I didn't see any "OpenSSL TLSEXT_TYPE_status_request Memory Leak Denial of Service" entries ;-) They're disappeared! I did not have to create another rule.

    The websites works now good, anything works good ;-) Very strange - isn't it ;-)

    Thank You for Your HELP ;-)

  • Konrad,

    this is not strange. Inside the 3.13.00, OpenSSL TLSEXT_TYPE_status_request Memory Leak Denial of Service has been removed as Signature, so that's why now it works.

    Sophos XG uses IPS signature based and a false positive can occur. They removed it on time!

     

Reply
  • Konrad,

    this is not strange. Inside the 3.13.00, OpenSSL TLSEXT_TYPE_status_request Memory Leak Denial of Service has been removed as Signature, so that's why now it works.

    Sophos XG uses IPS signature based and a false positive can occur. They removed it on time!

     

Children