ID

VAR-201712-0309


CVE

CVE-2017-17382


TITLE

TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding

Trust: 0.8

sources: CERT/CC: VU#144389

DESCRIPTION

Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack. TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding, and may therefore be vulnerable to Bleichenbacher-style attacks. This attack is known as a "ROBOT attack". Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway Contains an information disclosure vulnerability.Information may be obtained. Multiple Citrix Products are prone to an information-disclosure vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks to obtain sensitive information, and perform unauthorized actions. Successful exploits will lead to other attacks. Security vulnerabilities exist in Citrix NetScaler ADC and NetScaler Gateway. A remote attacker can exploit this vulnerability to decrypt TLS-encrypted data

Trust: 2.7

sources: NVD: CVE-2017-17382 // CERT/CC: VU#144389 // JVNDB: JVNDB-2017-011823 // BID: 102173 // VULHUB: VHN-108399

AFFECTED PRODUCTS

vendor:citrixmodel:netscaler gatewayscope:eqversion:12.0

Trust: 1.9

vendor:citrixmodel:netscaler gatewayscope:eqversion:11.1

Trust: 1.9

vendor:citrixmodel:netscaler gatewayscope:eqversion:11.0

Trust: 1.9

vendor:citrixmodel:netscaler gatewayscope:eqversion:10.5

Trust: 1.9

vendor:citrixmodel:application delivery controllerscope:eqversion:11.1

Trust: 1.6

vendor:citrixmodel:application delivery controllerscope:eqversion:10.5

Trust: 1.6

vendor:citrixmodel:application delivery controllerscope:eqversion:11.0

Trust: 1.6

vendor:citrixmodel:application delivery controllerscope:eqversion:12.0

Trust: 1.6

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:citrixmodel: - scope: - version: -

Trust: 0.8

vendor:erlangmodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:legion of the bouncy castlemodel: - scope: - version: -

Trust: 0.8

vendor:matrixsslmodel: - scope: - version: -

Trust: 0.8

vendor:micro focusmodel: - scope: - version: -

Trust: 0.8

vendor:wolfsslmodel: - scope: - version: -

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:eqversion:11.0 build 71.22

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:eqversion:10.5 build 67.13

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:ltversion:10.5

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:ltversion:11.0

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:ltversion:11.1

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:eqversion:12.0 build 53.22

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:ltversion:12.0

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:ltversion:11.0

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:eqversion:11.1 build 56.19

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:eqversion:10.5 build 67.13

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:eqversion:11.0 build 71.22

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:ltversion:12.0

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:eqversion:11.1 build 56.19

Trust: 0.8

vendor:citrixmodel:netscaler gatewayscope:eqversion:12.0 build 53.22

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:ltversion:10.5

Trust: 0.8

vendor:citrixmodel:netscaler application delivery controllerscope:ltversion:11.1

Trust: 0.8

vendor:citrixmodel:netscaler adcscope:eqversion:12.0

Trust: 0.3

vendor:citrixmodel:netscaler adcscope:eqversion:11.1

Trust: 0.3

vendor:citrixmodel:netscaler adcscope:eqversion:11.0

Trust: 0.3

vendor:citrixmodel:netscaler adcscope:eqversion:10.5

Trust: 0.3

vendor:citrixmodel:netscaler gateway buildscope:neversion:12.053.22

Trust: 0.3

vendor:citrixmodel:netscaler gateway buildscope:neversion:11.156.19

Trust: 0.3

vendor:citrixmodel:netscaler gateway buildscope:neversion:11.071.22

Trust: 0.3

vendor:citrixmodel:netscaler gateway buildscope:neversion:10.567.13

Trust: 0.3

vendor:citrixmodel:netscaler adc buildscope:neversion:12.053.22

Trust: 0.3

vendor:citrixmodel:netscaler adc buildscope:neversion:11.156.19

Trust: 0.3

vendor:citrixmodel:netscaler adc buildscope:neversion:11.071.22

Trust: 0.3

vendor:citrixmodel:netscaler adc buildscope:neversion:10.567.13

Trust: 0.3

sources: CERT/CC: VU#144389 // BID: 102173 // JVNDB: JVNDB-2017-011823 // CNNVD: CNNVD-201712-498 // NVD: CVE-2017-17382

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-17382
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-17382
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201712-498
value: MEDIUM

Trust: 0.6

VULHUB: VHN-108399
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-17382
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-108399
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-17382
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-108399 // JVNDB: JVNDB-2017-011823 // CNNVD: CNNVD-201712-498 // NVD: CVE-2017-17382

PROBLEMTYPE DATA

problemtype:CWE-327

Trust: 1.1

problemtype:CWE-200

Trust: 0.9

sources: VULHUB: VHN-108399 // JVNDB: JVNDB-2017-011823 // NVD: CVE-2017-17382

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-498

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201712-498

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011823

PATCH

title:CTX230238url:https://support.citrix.com/article/CTX230238

Trust: 0.8

title:Citrix NetScaler Application Delivery Controller and NetScaler Gateway Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=77140

Trust: 0.6

sources: JVNDB: JVNDB-2017-011823 // CNNVD: CNNVD-201712-498

EXTERNAL IDS

db:CERT/CCid:VU#144389

Trust: 3.6

db:NVDid:CVE-2017-17382

Trust: 2.8

db:BIDid:102173

Trust: 2.0

db:SECTRACKid:1039985

Trust: 1.7

db:JVNid:JVNVU92438713

Trust: 0.8

db:JVNDBid:JVNDB-2017-011823

Trust: 0.8

db:CNNVDid:CNNVD-201712-498

Trust: 0.7

db:AUSCERTid:ESB-2023.1514

Trust: 0.6

db:VULHUBid:VHN-108399

Trust: 0.1

sources: CERT/CC: VU#144389 // VULHUB: VHN-108399 // BID: 102173 // JVNDB: JVNDB-2017-011823 // CNNVD: CNNVD-201712-498 // NVD: CVE-2017-17382

REFERENCES

url:https://support.citrix.com/article/ctx230238

Trust: 2.8

url:https://www.kb.cert.org/vuls/id/144389

Trust: 2.8

url:http://www.securityfocus.com/bid/102173

Trust: 1.7

url:https://robotattack.org/

Trust: 1.7

url:http://www.securitytracker.com/id/1039985

Trust: 1.7

url:https://robotattack.org

Trust: 0.8

url:https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf

Trust: 0.8

url:http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf

Trust: 0.8

url:https://www.cert.org/historical/advisories/ca-1998-07.cfm

Trust: 0.8

url:https://tools.ietf.org/html/rfc5246#section-7.4.7.1

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/203.html

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171212-bleichenbacher

Trust: 0.8

url:https://support.f5.com/csp/article/k21905460

Trust: 0.8

url:https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c

Trust: 0.8

url:https://github.com/matrixssl/matrixssl/blob/master/doc/changes.md

Trust: 0.8

url:https://support.microfocus.com/kb/doc.php?id=7022561

Trust: 0.8

url:https://github.com/wolfssl/wolfssl/pull/1229

Trust: 0.8

url:https://community.rsa.com/docs/doc-85268

Trust: 0.8

url:https://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17382

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92438713/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-17382

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.1514

Trust: 0.6

url:http://www.citrix.com

Trust: 0.3

sources: CERT/CC: VU#144389 // VULHUB: VHN-108399 // BID: 102173 // JVNDB: JVNDB-2017-011823 // CNNVD: CNNVD-201712-498 // NVD: CVE-2017-17382

CREDITS

Hanno Böck (hanno@hboeck.de), Juraj Somorovsky (juraj.somorovsky@rub.de) of Ruhr-Universität Bochum / Hackmanit GmbH and Craig Young (vuln report@secur3.us) of Tripwire VERT.

Trust: 0.3

sources: BID: 102173

SOURCES

db:CERT/CCid:VU#144389
db:VULHUBid:VHN-108399
db:BIDid:102173
db:JVNDBid:JVNDB-2017-011823
db:CNNVDid:CNNVD-201712-498
db:NVDid:CVE-2017-17382

LAST UPDATE DATE

2024-11-23T20:19:29.822000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#144389date:2018-04-09T00:00:00
db:VULHUBid:VHN-108399date:2019-10-03T00:00:00
db:BIDid:102173date:2017-12-19T22:38:00
db:JVNDBid:JVNDB-2017-011823date:2018-01-29T00:00:00
db:CNNVDid:CNNVD-201712-498date:2023-03-13T00:00:00
db:NVDid:CVE-2017-17382date:2024-11-21T03:17:52.007

SOURCES RELEASE DATE

db:CERT/CCid:VU#144389date:2017-12-12T00:00:00
db:VULHUBid:VHN-108399date:2017-12-13T00:00:00
db:BIDid:102173date:2017-12-12T00:00:00
db:JVNDBid:JVNDB-2017-011823date:2018-01-29T00:00:00
db:CNNVDid:CNNVD-201712-498date:2017-12-14T00:00:00
db:NVDid:CVE-2017-17382date:2017-12-13T16:29:00.253