Brocade Security Advisory |
|
||||||||||||||||||||||||||||||||||||||||||||
Summary
If an SSL/TLS server or client is running on a
32-bit host, and a specific cipher is being used, then a truncated packet can
cause that server or client to perform an out-of-bounds read, usually
resulting in a crash. Affected Products
Products Confirmed Not Vulnerable
Brocade
Fabric OS, Brocade FastIron OS, Brocade NetIron OS, Brocade Network OS, Brocade Services
Director, Brocade SLX-OS, and Brocade Virtual Web Application Firewall are
confirmed not affected by this vulnerability. Workaround
There are no workarounds that address this
vulnerability. Revision History
Disclaimer
THIS
DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND
DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE
INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED
HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE
VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE
RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. |