-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Aruba Product Security Advisory =============================== Advisory ID: ARUBA-PSA-2015-001 CVE: CVE-2015-1348 Publication Date: 2015-01-27 Status: Confirmed, Fixed Revision: 1 Title ===== Aruba Instant (IAP) Wireless DoS Attack Overview ======== Aruba has identified a problem with Aruba Instant firmware which could allow an attacker to crash or clear the configuration of an access point through a wireless interface. Affected Products ================= -- Aruba Instant version 4.0.0.6 and below (version <= 4.0.0.6) -- Aruba Instant version 4.1 below 4.1.1.2 (4.1.0.0 <= version < 4.1.1.2) Solution ======== Upgrade to one of the following software versions: -- Aruba Instant version 4.0.0.7 -- Aruba Instant version 4.1.1.2 At the time of publication, version 4.0.0.8 is available through Aruba's cloud image server; this version may be installed from within the IAP administrative interface. Details ======= This vulnerability allows an attacker to cause an IAP to halt operation by sending crafted malformed frames over a wireless interface. Under some conditions, the attack could cause an IAP cluster to lose its configuration, forcing the cluster back to a factory-default state. In order to protect customer networks, Aruba is providing no additional details in the initial advisory. In accordance with our vulnerability disclosure policy, Aruba will update this advisory in 60 days to provide full details of the vulnerability. Workaround ========== There is no workaround for this issue. Vulnerability Metrics ===================== Vulnerability Class: Heap-based Buffer Overflow (CWE-122) Severity: Low CVSSv2 Overall Score: 2.4 CVSSv2 Group Scores: Base: 2.1, Temporal: 1.6, Environmental: 2.4 CVSSv2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C/CDP:N/TD:ND/CR:L/IR:L/AR:H) Discovery ========= This issue was reported to Aruba's TAC by a customer. Obtaining Fixed Software ======================== Aruba customers can obtain software updates on the support website: http://support.arubanetworks.com Aruba Support contacts are as follows: +1-800-WiFiLAN (1-800-943-4526) (toll free from within North America) +1-408-754-1200 (toll call from anywhere in the world) The full contact list is at: http://www.arubanetworks.com/support-services/support-program/contact-support/ e-mail: support(at)arubanetworks.com Please do not contact "sirt(at)arubanetworks.com" for software upgrades. Revision History ================ Revision 1.0 / 2015-Jan-27 / Initial release Aruba SIRT Security Procedures ============================== Complete information on reporting security vulnerabilities in Aruba Networks products, obtaining assistance with security incidents is available at: http://www.arubanetworks.com/support-services/security-bulletins/ For reporting *NEW* Aruba Networks security issues, email can be sent to sirt(at)arubanetworks.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at: http://www.arubanetworks.com/support-services/security-bulletins/ (c) Copyright 2015 by Aruba Networks, Inc. This advisory may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQEcBAEBCAAGBQJUwo2oAAoJEJj+CcpFhYbZYtkH/i/i2T6/kbQ9eqiFOJz8VjP/ OPKNhmzhk9uFh5zx6oR3oLZkUVnxRNYnATksM3dk+K14nMXQMUHAMQ3acdkMX0oY RtOeazUjGa9EtsyqKc2Wosl8NxN7jfIk3AXGJOg9Spvlt+zYLuDORHngrypmOoQa 9lGaccro1cGccuOOFHpnhS7xc70SrZShL0Ske8kMG7GemThdTSde906k4jloNvK8 NjwLPwwMZ3MjHCXEljqPZHDsE6wMhMdsFmHRsE+geoAvm31Joxm1et+7WMhEKxmL rNCe8+71vcPb5Hx0LxYToY2J0lOR6YQVM96d+O/CCd9wt6ZLJGNqyL/rA27hsUk= =syzk -----END PGP SIGNATURE-----