Environment
Access Manager 4.4
Access Manager 4.3
Access Manager 4.2
Situation
The OpenSSL open source project team recently released an update to
1.0.2n with a number of fixes
(https://www.openssl.org/news/openssl-1.0.2-notes.html). The Access
Gateway component of Access Manager uses this library for cryptographic
functions. It is recommended that all the Access Gateways be updated
with this latest OpenSSL patch, using the instructions below, to avoid
any concerns.
Resolution
Depending on the Access Gateway platform, different approaches are required to apply the fix.
a) On an Access Manager or Access Gateway Appliance platform: Simply apply the security updates from the Security update channel to have the latest patches applied. The instructions at https://www.netiq.com/documentation/access-manager-44/install_upgrade/data/bowu0bx.html outline how to do this.
b) On a Linux based Access Gateway Service (SLES or RHEL): Apply the instructions from TID 7017580, passing in the filename of novell-nacm-apache-extra-4.1.7-1.0.2n to update to OpenSSL 1.0.2n.
c) On a Windows based Access Gateway Service: Apply the instructions from TID 7017582, passing in the filename of Openssl_Win_102n to update to OpenSSL 1.0.2n.
a) On an Access Manager or Access Gateway Appliance platform: Simply apply the security updates from the Security update channel to have the latest patches applied. The instructions at https://www.netiq.com/documentation/access-manager-44/install_upgrade/data/bowu0bx.html outline how to do this.
b) On a Linux based Access Gateway Service (SLES or RHEL): Apply the instructions from TID 7017580, passing in the filename of novell-nacm-apache-extra-4.1.7-1.0.2n to update to OpenSSL 1.0.2n.
c) On a Windows based Access Gateway Service: Apply the instructions from TID 7017582, passing in the filename of Openssl_Win_102n to update to OpenSSL 1.0.2n.
Cause
Major changes between OpenSSL 1.0.2m and OpenSSL 1.0.2n [7 Dec 2017]
- Read/write after SSL object in error state (CVE-2017-3737)
- rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)