<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed&amp;quot; in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37903#M4513</link>
    <description>&lt;I&gt;This reply was created from a merged topic originally titled  &lt;A href="http://community.extremenetworks.com/extreme/topics/extreme_networks_response_to_us_cert_vulnerability_advisory_vu_720951" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Networks Response to US-CERT Vulnerability Advisory VU#720951&lt;/A&gt;.&lt;/I&gt;  Article ID: 16131 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
Black Diamond Series X8, 8900, and 8800 running EXOS version 15.4.1&lt;BR /&gt;
Summit Series X770, X670, X480, X460, X440, X430, E4G-200, and E4G-400 running EXOS version 15.4.1&lt;BR /&gt;
64-bit (Ubuntu) hardware-based and virtual NetSight appliances running version 4.4, 5.0, 5.1, or 6.0&lt;BR /&gt;
64-bit (Ubuntu) hardware-based and virtual NAC &amp;amp; IA appliances running version 5.0, 5.1, or 6.0&lt;BR /&gt;
64-bit (Ubuntu) hardware-based and virtual Purview appliances running version 6.0&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
On April 7 2014, US-CERT issued advisory &lt;A href="http://www.kb.cert.org/vuls/id/720951" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="http://www.kb.cert.org/vuls/id/720951" target="_blank" rel="nofollow noreferrer noopener"&gt;720951&lt;/A&gt;&lt;/PRE&gt;.&lt;BR /&gt;
(This issue is also tracked as &lt;A href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2014-0160&lt;/A&gt;&lt;/PRE&gt;, and discussed in &lt;A href="http://bit.ly/1t03AZw" target="_blank" rel="nofollow noreferrer noopener"&gt;16130&lt;/A&gt;.)&lt;BR /&gt;
&lt;BR /&gt;
The advisory overview...&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;OpenSSL 1.0.1 contains a vulnerability that could disclose sensitive private information to an attacker. This vulnerability is commonly referred to as "heartbleed."&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The advisory impact...&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;By attacking a service that uses a vulnerable version of OpenSSL, a remote, unauthenticated attacker may be able to retrieve sensitive information, such as secret keys. By leveraging this information, an attacker may be able to decrypt, spoof, or perform man-in-the-middle attacks on network traffic that would otherwise be protected by OpenSSL.&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The advisory lists a number of affected vendors, including &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Extreme Networks&lt;/PRE&gt;&lt;/DIV&gt; and &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Enterasys Networks&lt;/PRE&gt;&lt;/DIV&gt;.&lt;BR /&gt;
&lt;BR /&gt;
If within the advisory the hyperlinked &lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY332" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY332" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Networks&lt;/A&gt;&lt;/PRE&gt; or &lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY32U" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY32U" target="_blank" rel="nofollow noreferrer noopener"&gt;Enterasys Networks&lt;/A&gt;&lt;/PRE&gt; Information still reads "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;No statement is currently available from the vendor regarding this vulnerability.&lt;/PRE&gt;&lt;/DIV&gt;", then please refer to &lt;A href="http://learn.extremenetworks.com/rs/extreme/images/CERT_VU%23720951_Vulnerability_Advisory_04_11_2014v2.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;this statement&lt;/A&gt; (.pdf, 200 KB) submitted to US-CERT on April 11 2014.&lt;BR /&gt;
&lt;BR /&gt;
EXOS 15.4.1.3-patch1-10 is available for download via &lt;A href="https://esupport.extremenetworks.com/eservice_enu/start.swe" target="_blank" rel="nofollow noreferrer noopener"&gt;eSupport&lt;/A&gt;'s "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Download Software Updates&lt;/PRE&gt;&lt;/DIV&gt;" link.&lt;BR /&gt;
The NetSight patch is available for download from the &lt;A href="https://extranet.enterasys.com/downloads/Pages/NMS.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;NMS Product page&lt;/A&gt;, or &lt;A href="https://enterasys.box.com/shared/static/04o3hf3aryuym26t0c4m.zip" target="_blank" rel="nofollow noreferrer noopener"&gt;here&lt;/A&gt; (1.5 MB).&lt;BR /&gt;
A set of Dragon signatures was released on April 9, to assist in detecting attempted exploits.</description>
    <pubDate>Tue, 15 Apr 2014 00:22:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2014-04-15T00:22:00Z</dc:date>
    <item>
      <title>Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37894#M4504</link>
      <description>Patches will be available for all affected products by Monday (4/14).   Reference Extreme Network CERT VU#720951 Vulnerability Advisory note for additional details.  &lt;A href="http://learn.extremenetworks.com/rs/extreme/images/CERT_VU%23720951_Vulnerability_Advisory_04_11_2014v2.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;http://learn.extremenetworks.com/rs/extreme/images/CERT_VU%23720951_Vulnerability_Advisory_04_11_2014v2.pdf&lt;/A&gt;</description>
      <pubDate>Sat, 12 Apr 2014 10:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37894#M4504</guid>
      <dc:creator>Tamera_Rousseau</dc:creator>
      <dc:date>2014-04-12T10:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37895#M4505</link>
      <description>ExtremXOS 15.4.1.3-patch1-10 has been released and it is ready to download.&lt;BR /&gt;</description>
      <pubDate>Sat, 12 Apr 2014 20:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37895#M4505</guid>
      <dc:creator>Sumit_Tokle</dc:creator>
      <dc:date>2014-04-12T20:30:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37896#M4506</link>
      <description>Extreme switch won’t be affected as long as “https” is disabled  like below test result but it is strongly recommended not to use the version  which does not have the patch.      Below is the result of the nmap to identify the vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    #####################################&lt;BR /&gt;
&lt;BR /&gt;
    nmap -sV -p 443 --script=&lt;B&gt;&lt;U&gt;ssl-heartbleed.nse&lt;/U&gt;&lt;/B&gt; &lt;B&gt;&lt;U&gt;10.120.120.90&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Starting Nmap 6.45 ( &lt;A href="http://nmap.org" target="_blank" rel="nofollow noreferrer noopener"&gt;http://nmap.org&lt;/A&gt;  ) at 2014-04-14 12:15 SGT&lt;BR /&gt;
&lt;BR /&gt;
    Warning: File ./nmap-services exists, but Nmap is using  /usr/local/bin/../share/nmap/nmap-services for security and consistency  reasons.  &lt;BR /&gt;
&lt;BR /&gt;
    set NMAPDIR=. to give priority to files in your local directory  (may affect the other data files too).&lt;BR /&gt;
&lt;BR /&gt;
    Nmap scan report for 10.120.120.90&lt;BR /&gt;
&lt;BR /&gt;
    Host is up (0.0016s latency).&lt;BR /&gt;
&lt;BR /&gt;
    PORT    STATE  SERVICE VERSION&lt;BR /&gt;
&lt;BR /&gt;
    &lt;B&gt;&lt;U&gt;443/tcp closed https&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Service detection performed. Please report any incorrect results  at &lt;A href="http://nmap.org/submit/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://nmap.org/submit/&lt;/A&gt; .&lt;BR /&gt;
&lt;BR /&gt;
    Nmap done: 1 IP address (1 host up) scanned in 0.46 seconds&lt;BR /&gt;
&lt;BR /&gt;
    #####################################&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    #####################################&lt;BR /&gt;
&lt;BR /&gt;
    * X440-24t-10G-USB2.16 # sh "Mgmt" &lt;BR /&gt;
&lt;BR /&gt;
        Primary  IP:          &lt;B&gt;&lt;U&gt;10.120.120.90&lt;/U&gt;&lt;/B&gt;/24&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    * X440-24t-10G-USB2.11 # sh ver&lt;BR /&gt;
&lt;BR /&gt;
    Switch      : 800475-00-10 1323N-44095  Rev 10.0 BootROM: 2.0.1.7    IMG: 15.4.1.3  &lt;BR /&gt;
&lt;BR /&gt;
    PSU-1       : Internal Power  Supply  &lt;BR /&gt;
&lt;BR /&gt;
    PSU-2       :&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Image   : ExtremeXOS version &lt;B&gt;&lt;U&gt;15.4.1.3  v1541b3-patch1-1&lt;/U&gt;&lt;/B&gt; by release-manager&lt;BR /&gt;
&lt;BR /&gt;
              on Fri  Jan 17 15:25:46 EST 2014&lt;BR /&gt;
&lt;BR /&gt;
    BootROM : 2.0.1.7&lt;BR /&gt;
&lt;BR /&gt;
    Diagnostics : 6.3&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    * X440-24t-10G-USB2.12 # sh management &lt;BR /&gt;
&lt;BR /&gt;
    CLI idle  timeout                  : Enabled (20 minutes)&lt;BR /&gt;
&lt;BR /&gt;
    CLI max number of login attempts : 3&lt;BR /&gt;
&lt;BR /&gt;
    CLI max number of sessions       :  8&lt;BR /&gt;
&lt;BR /&gt;
    CLI  paging                        : Enabled (this session only)&lt;BR /&gt;
&lt;BR /&gt;
    CLI  space-completion              : Disabled (this session only)&lt;BR /&gt;
&lt;BR /&gt;
    CLI configuration  logging        : Disabled&lt;BR /&gt;
&lt;BR /&gt;
    CLI  scripting                     : Disabled (this session only)&lt;BR /&gt;
&lt;BR /&gt;
    CLI scripting error  mode         : Ignore-Error (this  session only)&lt;BR /&gt;
&lt;BR /&gt;
    CLI persistent  mode               : Persistent (this session only)&lt;BR /&gt;
&lt;BR /&gt;
    CLI  prompting                     : Enabled (this session only)&lt;BR /&gt;
&lt;BR /&gt;
    Telnet  access                     : Enabled (tcp port 23 vr all)&lt;BR /&gt;
&lt;BR /&gt;
                                      : Access Profile : not set&lt;BR /&gt;
&lt;BR /&gt;
    &lt;B&gt;&lt;U&gt;SSH  access                        : Enabled (Key valid, tcp port 22 vr all)&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
                                      : Access Profile : not set&lt;BR /&gt;
&lt;BR /&gt;
    &lt;B&gt;&lt;U&gt;Web  access                        : Disabled (tcp port 80)&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
                                      : Access Profile : not set&lt;BR /&gt;
&lt;BR /&gt;
    Total Read Only Communities      : 1&lt;BR /&gt;
&lt;BR /&gt;
    Total Read Write Communities     : 1&lt;BR /&gt;
&lt;BR /&gt;
    RMON                              : Disabled&lt;BR /&gt;
&lt;BR /&gt;
    SNMP  access                       : Enabled&lt;BR /&gt;
&lt;BR /&gt;
                                      : Access Profile : not set&lt;BR /&gt;
&lt;BR /&gt;
    SNMP Compatibility Options       :&lt;BR /&gt;
&lt;BR /&gt;
        GETBULK Reply Too Big Action : Too Big Error&lt;BR /&gt;
&lt;BR /&gt;
    SNMP  Traps                        : Enabled&lt;BR /&gt;
&lt;BR /&gt;
    SNMP v1/v2c  TrapReceivers        : None&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    SNMP stats:     InPkts  0       OutPkts    0       Errors  0       AuthErrors 0&lt;BR /&gt;
&lt;BR /&gt;
                     Gets   0       GetNexts   0       Sets    0       Drops       0       &lt;BR /&gt;
&lt;BR /&gt;
    SNMP traps:     Sent    0       AuthTraps Enabled&lt;BR /&gt;
&lt;BR /&gt;
    SNMP inform:    Sent    0       Retries    0       Failed 0&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    * X440-24t-10G-USB2.14 # disable web https &lt;BR /&gt;
&lt;BR /&gt;
    SSL Module: Not Installed&lt;BR /&gt;
&lt;BR /&gt;
    #####################################&lt;BR /&gt;
&lt;BR /&gt;
     &lt;A href="http://hackertarget.com/testing-heartbleed-with-the-nmap-nse-script/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://hackertarget.com/testing-heartbleed-with-the-nmap-nse-script/&lt;/A&gt;  Used the script from this website.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Apr 2014 10:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37896#M4506</guid>
      <dc:creator>Sumit_Tokle</dc:creator>
      <dc:date>2014-04-14T10:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37897#M4507</link>
      <description>still no able to see the Patch 1-10 release &lt;BR /&gt;</description>
      <pubDate>Mon, 14 Apr 2014 18:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37897#M4507</guid>
      <dc:creator>PJ1</dc:creator>
      <dc:date>2014-04-14T18:12:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37898#M4508</link>
      <description>I got the confirmation mail by saying that it has been uploaded. Can you please check again in our esupport web portal?&lt;BR /&gt;
&lt;BR /&gt;
Thanks</description>
      <pubDate>Mon, 14 Apr 2014 19:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37898#M4508</guid>
      <dc:creator>Sumit_Tokle</dc:creator>
      <dc:date>2014-04-14T19:19:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37899#M4509</link>
      <description>i've recheckd&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Apr 2014 19:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37899#M4509</guid>
      <dc:creator>PJ1</dc:creator>
      <dc:date>2014-04-14T19:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37900#M4510</link>
      <description>PJ, we just verified the patch is definitely posted.  If you are not able to access it, I suggest you call into the TAC so we can get this sorted out for you ASAP.&lt;BR /&gt;
&lt;BR /&gt;
thanks&lt;BR /&gt;
Mike</description>
      <pubDate>Mon, 14 Apr 2014 19:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37900#M4510</guid>
      <dc:creator>Mike_Lytle</dc:creator>
      <dc:date>2014-04-14T19:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37901#M4511</link>
      <description>Thnx for sorting it out.&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Apr 2014 19:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37901#M4511</guid>
      <dc:creator>PJ1</dc:creator>
      <dc:date>2014-04-14T19:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37902#M4512</link>
      <description>See also, in the FAQ section of this forum:&lt;BR /&gt;
16131, "Extreme Networks Response to US-CERT Vulnerability Advisory VU#720951" (&lt;A href="http://bit.ly/1n6cUcI)" target="_blank" rel="nofollow noreferrer noopener"&gt;http://bit.ly/1n6cUcI)&lt;/A&gt;.</description>
      <pubDate>Mon, 14 Apr 2014 23:46:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37902#M4512</guid>
      <dc:creator>Paul_Poyant</dc:creator>
      <dc:date>2014-04-14T23:46:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37903#M4513</link>
      <description>&lt;I&gt;This reply was created from a merged topic originally titled  &lt;A href="http://community.extremenetworks.com/extreme/topics/extreme_networks_response_to_us_cert_vulnerability_advisory_vu_720951" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Networks Response to US-CERT Vulnerability Advisory VU#720951&lt;/A&gt;.&lt;/I&gt;  Article ID: 16131 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
Black Diamond Series X8, 8900, and 8800 running EXOS version 15.4.1&lt;BR /&gt;
Summit Series X770, X670, X480, X460, X440, X430, E4G-200, and E4G-400 running EXOS version 15.4.1&lt;BR /&gt;
64-bit (Ubuntu) hardware-based and virtual NetSight appliances running version 4.4, 5.0, 5.1, or 6.0&lt;BR /&gt;
64-bit (Ubuntu) hardware-based and virtual NAC &amp;amp; IA appliances running version 5.0, 5.1, or 6.0&lt;BR /&gt;
64-bit (Ubuntu) hardware-based and virtual Purview appliances running version 6.0&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
On April 7 2014, US-CERT issued advisory &lt;A href="http://www.kb.cert.org/vuls/id/720951" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="http://www.kb.cert.org/vuls/id/720951" target="_blank" rel="nofollow noreferrer noopener"&gt;720951&lt;/A&gt;&lt;/PRE&gt;.&lt;BR /&gt;
(This issue is also tracked as &lt;A href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2014-0160&lt;/A&gt;&lt;/PRE&gt;, and discussed in &lt;A href="http://bit.ly/1t03AZw" target="_blank" rel="nofollow noreferrer noopener"&gt;16130&lt;/A&gt;.)&lt;BR /&gt;
&lt;BR /&gt;
The advisory overview...&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;OpenSSL 1.0.1 contains a vulnerability that could disclose sensitive private information to an attacker. This vulnerability is commonly referred to as "heartbleed."&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The advisory impact...&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;By attacking a service that uses a vulnerable version of OpenSSL, a remote, unauthenticated attacker may be able to retrieve sensitive information, such as secret keys. By leveraging this information, an attacker may be able to decrypt, spoof, or perform man-in-the-middle attacks on network traffic that would otherwise be protected by OpenSSL.&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The advisory lists a number of affected vendors, including &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Extreme Networks&lt;/PRE&gt;&lt;/DIV&gt; and &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Enterasys Networks&lt;/PRE&gt;&lt;/DIV&gt;.&lt;BR /&gt;
&lt;BR /&gt;
If within the advisory the hyperlinked &lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY332" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY332" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Networks&lt;/A&gt;&lt;/PRE&gt; or &lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY32U" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;/A&gt;&lt;PRE&gt;&lt;A href="http://www.kb.cert.org/vuls/id/BLUU-9HY32U" target="_blank" rel="nofollow noreferrer noopener"&gt;Enterasys Networks&lt;/A&gt;&lt;/PRE&gt; Information still reads "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;No statement is currently available from the vendor regarding this vulnerability.&lt;/PRE&gt;&lt;/DIV&gt;", then please refer to &lt;A href="http://learn.extremenetworks.com/rs/extreme/images/CERT_VU%23720951_Vulnerability_Advisory_04_11_2014v2.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;this statement&lt;/A&gt; (.pdf, 200 KB) submitted to US-CERT on April 11 2014.&lt;BR /&gt;
&lt;BR /&gt;
EXOS 15.4.1.3-patch1-10 is available for download via &lt;A href="https://esupport.extremenetworks.com/eservice_enu/start.swe" target="_blank" rel="nofollow noreferrer noopener"&gt;eSupport&lt;/A&gt;'s "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Download Software Updates&lt;/PRE&gt;&lt;/DIV&gt;" link.&lt;BR /&gt;
The NetSight patch is available for download from the &lt;A href="https://extranet.enterasys.com/downloads/Pages/NMS.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;NMS Product page&lt;/A&gt;, or &lt;A href="https://enterasys.box.com/shared/static/04o3hf3aryuym26t0c4m.zip" target="_blank" rel="nofollow noreferrer noopener"&gt;here&lt;/A&gt; (1.5 MB).&lt;BR /&gt;
A set of Dragon signatures was released on April 9, to assist in detecting attempted exploits.</description>
      <pubDate>Tue, 15 Apr 2014 00:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37903#M4513</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-04-15T00:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37904#M4514</link>
      <description>KB Article Please reference the new topic here: &lt;A href="http://community.extremenetworks.com/extreme/topics/extreme_networks_response_to_us_cert_vulnerability_advisory_vu_720951_article_id_16131" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Networks Response to US-CERT Vulnerability Advisory VU#720951 Article ID:...&lt;/A&gt;</description>
      <pubDate>Tue, 15 Apr 2014 00:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37904#M4514</guid>
      <dc:creator>Tamera_Rousseau</dc:creator>
      <dc:date>2014-04-15T00:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37905#M4515</link>
      <description>&lt;I&gt;This reply was created from a merged topic originally titled  &lt;A href="http://community.extremenetworks.com/extreme/topics/heartbleed_openssl_vulnerability_in_nms_oneview_or_wireless_controller" target="_blank" rel="nofollow noreferrer noopener"&gt;Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller&lt;/A&gt;.&lt;/I&gt;  Are NMS/Oneview, or the wireless controller at risk of the Heartbleed OpenSSL vulnerability?  What revision levels are at risk?   Is there a corporate statement of exposure risk and mitigation?&lt;BR /&gt;
See similar post about XOS.&lt;BR /&gt;
&lt;A href="https://community.extremenetworks.com/extreme/topics/heartbleed_openssl_vulnerability" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/heartbleed_openssl_vulnerability&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Apr 2014 00:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37905#M4515</guid>
      <dc:creator>Skowronek__Kurt</dc:creator>
      <dc:date>2014-04-15T00:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37906#M4516</link>
      <description>&lt;I&gt;This reply was created from a merged topic originally titled  &lt;A href="http://community.extremenetworks.com/extreme/topics/extreme_networks_response_to_heartbleed_cve_2014_0160_openssl_vulnerability" target="_blank" rel="nofollow noreferrer noopener"&gt;Response to "Heartbleed" CVE-2014-0160 OpenSSL vulnerability&lt;/A&gt;.&lt;/I&gt;  Article ID: 16130 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
The issue affects products which use OpenSSL 1.0.1 (March 2012) through 1.0.1f for SSL/HTTPS support.&lt;BR /&gt;
OpenSSL 1.0.1g, released April 7 2014, resolves the vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
Affected:&lt;UL&gt; 
&lt;LI&gt;Black Diamond Series X8, 8900, and 8800 running EXOS version 15.4.1 
&lt;/LI&gt;&lt;LI&gt;Summit Series X770, X670, X480, X460, X440, X430, E4G-200, and E4G-400 running EXOS version 15.4.1 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual NetSight appliances running version 4.4, 5.0, 5.1, or 6.0 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual NAC &amp;amp; IA appliances running version 5.0, 5.1, or 6.0 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual Purview appliances running version 6.0&lt;/LI&gt;&lt;/UL&gt;&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
Vulnerability notification &lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2014-0160&lt;/A&gt; was released on April 7 2014.&lt;BR /&gt;
Its Overview states:&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The high visibility and potentially high impact of this issue has spawned many follow-up reports which are visible in a web search for "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;heartbleed&lt;/PRE&gt;&lt;/DIV&gt;" or "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;CVE-2014-0160&lt;/PRE&gt;&lt;/DIV&gt;".&lt;BR /&gt;
&lt;BR /&gt;
Patches have been developed to address this vulnerability across all affected products, and these will be included in subsequent GA releases. Patch availability is discussed in &lt;A href="http://bit.ly/1n6cUcI" target="_blank" rel="nofollow noreferrer noopener"&gt;16131&lt;/A&gt;, which addresses this issue being tracked as US-CERT Vulnerability Advisory VU#720951.</description>
      <pubDate>Tue, 15 Apr 2014 00:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37906#M4516</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-04-15T00:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37907#M4517</link>
      <description>KB Article Please reference the new topic here: &lt;A href="http://community.extremenetworks.com/extreme/topics/response_to_heartbleed_cve_2014_0160_openssl_vulnerability_article_id_16130" target="_blank" rel="nofollow noreferrer noopener"&gt;Response to "Heartbleed" CVE-2014-0160 OpenSSL Vulnerability Article ID 16130&lt;/A&gt;</description>
      <pubDate>Tue, 15 Apr 2014 00:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37907#M4517</guid>
      <dc:creator>Tamera_Rousseau</dc:creator>
      <dc:date>2014-04-15T00:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37908#M4518</link>
      <description>&lt;I&gt;This reply was created from a merged topic originally titled  &lt;A href="https://extreme.connectedcommunity.org/communities/community-home/digestviewer/viewthread?MessageKey=cbdcf63f-f410-4154-9231-a4f8a244cae1&amp;amp;CommunityKey=cf7323bb-aa98-4cf9-8c6d-69759c273339&amp;amp;tab=digestviewer#bmcbdcf63f-f410-4154-9231-a4f8a244cae1" target="_blank" rel="nofollow noreferrer noopener"&gt;heartbleed OpenSSL vulnerability&lt;/A&gt;.&lt;/I&gt;  Does anyone have any information on whether or not and which Enterasys or Extreme products are affected by this vulnerability?</description>
      <pubDate>Tue, 15 Apr 2014 00:28:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37908#M4518</guid>
      <dc:creator>Andy_M</dc:creator>
      <dc:date>2014-04-15T00:28:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37909#M4519</link>
      <description>&amp;lt;content-quote data-username="Andy_M"&amp;gt;      &lt;I&gt;This reply was created from a merged topic originally titled  &lt;A href="https://extreme.connectedcommunity.org/communities/community-home/digestviewer/viewthread?MessageKey=cbdcf63f-f410-4154-9231-a4f8a244cae1&amp;amp;CommunityKey=cf7323bb-aa98-4cf9-8c6d-69759c273339&amp;amp;tab=digestviewer#bmcbdcf63f-f410-4154-9231-a4f8a244cae1" target="_blank" rel="nofollow noreferrer noopener"&gt;heartbleed OpenSSL vulnerability&lt;/A&gt;.&lt;/I&gt;  Does anyone have any information on whether or not and which Enterasys or Extreme products are affected by this vulnerability?&amp;lt;/content-quote&amp;gt;Hi Andy. We have a comprehensive topic about this including a list of affected products.  Please visit this for additional information.  If you have additional questions, please ask them here in the community! &lt;A href="https://getsatisfaction.com/extreme/topics/extreme_networks_update_on_the_openssl_vulnerability_called_heartbleed" target="_blank" rel="nofollow noreferrer noopener"&gt;https://getsatisfaction.com/extreme/topics/extreme_networks_update_on_the_openssl_vulnerability_call...&lt;/A&gt;</description>
      <pubDate>Tue, 15 Apr 2014 00:28:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37909#M4519</guid>
      <dc:creator>Tamera_Rousseau</dc:creator>
      <dc:date>2014-04-15T00:28:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37910#M4520</link>
      <description>Hi&lt;BR /&gt;
&lt;BR /&gt;
After patch the NetSight, how can I make sure the bug has been fixed?&lt;BR /&gt;
&lt;BR /&gt;
Thanks.&lt;BR /&gt;
Kevin</description>
      <pubDate>Wed, 16 Apr 2014 14:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37910#M4520</guid>
      <dc:creator>Kevin_Su</dc:creator>
      <dc:date>2014-04-16T14:31:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37911#M4521</link>
      <description>This information was added yesterday to the end of the NetSight Patch readme file, in the copy that is accessible from the end of the "Article ID: 16131" as both embedded and hyperlinked above:&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Optional verification of results:&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;In 'dpkg -l | grep ssl' command output, the "libssl1.0.0" and "openssl" packages should display version "1.0.1-4ubuntu5.12" if the patch has been successfully applied.&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The last time I checked (yesterday), it had not yet been added to the copy out on the NMS Product page.</description>
      <pubDate>Wed, 16 Apr 2014 19:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37911#M4521</guid>
      <dc:creator>Paul_Poyant</dc:creator>
      <dc:date>2014-04-16T19:27:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37912#M4522</link>
      <description>Thanks, Paul.</description>
      <pubDate>Wed, 16 Apr 2014 19:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-networks-update-on-the-openssl-vulnerability-called/m-p/37912#M4522</guid>
      <dc:creator>Su__Kevin</dc:creator>
      <dc:date>2014-04-16T19:27:00Z</dc:date>
    </item>
  </channel>
</rss>

