Palo Alto Networks Security Advisories / CVE-2017-7529

CVE-2017-7529 PAN-OS: Nginx integer overflow may lead to information leak

047910
Severity 5.3 · MEDIUM
Attack Vector NETWORK
Attack Complexity LOW
Privileges Required NONE
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact LOW
Integrity Impact NONE
Availability Impact NONE

Description

Nginx web-server included with PAN-OS is vulnerable to an integer overflow vulnerability that can leak potentially a cache file header if a response was returned from cache.

This issue affects:

PAN-OS 7.1 versions earlier than 7.1.26;

PAN-OS 8.1 versions earlier than 8.1.13;

PAN-OS 9.0 versions earlier than 9.0.6;

All versions of PAN-OS 8.0.

Product Status

VersionsAffectedUnaffected
PAN-OS 9.1None>= 9.1.0
PAN-OS 9.0< 9.0.6>= 9.0.6
PAN-OS 8.1< 8.1.13>= 8.1.13
PAN-OS 8.08.0.*
PAN-OS 7.1< 7.1.26>= 7.1.26

Severity: MEDIUM

CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Weakness Type

CWE-190 Integer Overflow or Wraparound

Solution

This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.

Workarounds and Mitigations

Attacks against CVE-2017-7529 can be blocked with signatures for Unique Threat ID 33070 enabled on a different firewall configured to protect the vulnerable management interfaces.

This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface.

Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com

Timeline

Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.