Security Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products.
|
|
|
- Edith Booth
- 9 years ago
- Views:
Transcription
1 SECURITY BULLETIN - Multiple CVEs Relating to OpenSSL Bulletin Version 1.2 Security Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products. DATE PUBLISHED: This information applies to all Polycom products running OpenSSL versions through 0.9.8y, through 1.0.0l (lowercase L), through 1.0.1g. Please Note: This is a living document, updated regularly until any product affected by any of the vulnerabilities in this bulletin has been repaired against that vulnerability. The newest version of this document will always reside at the following URL: Vulnerability Summary Vulnerabilities in OpenSSL could allow a remote attacker to expose sensitive data, inject data across sessions, or perform a denial of service. Details SSL/TLS MITM vulnerability An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL and beta1. Users of OpenSSL servers earlier than are advised to upgrade as a precaution. This exploit is consistent with CVE DTLS recursion flaw By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected.
2 This exploit is consistent with CVE DTLS invalid fragment vulnerability A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected. This exploit is consistent with CVE SSL_MODE_RELEASE_BUFFERS NULL pointer dereference A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL and where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. This exploit is consistent with CVE SSL_MODE_RELEASE_BUFFERS session injection or denial of service A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. This exploit is consistent with CVE Anonymous ECDH denial of service OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. This exploit is consistent with CVE ECDSA NONCE side-channel recovery attack The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. This exploit is consistent with CVE
3 Products Affected Note that the only products in this table are the products confirmed by Polycom to be fixed against the vulnerabilities in this bulletin, or confirmed by Polycom to be unaffected by the vulnerabilities in this bulletin. All other products are still under investigation. RealPresence Distributed Media Application (DMA) RealPresence Media Manager RealPresence Capture Station CSS Gateway RealPresence Resource Manager (RPRM) CMA CX Video Products Other Than CX5500 RealPresence Mobile (RPM) FIXED by Version RealPresence Desktop (RPD) FIXED by Version M100 FIXED by Version CMAD FIXED by Version CSS FIXED by Version Group Series FIXED by Version Video Border Proxy (VBP) FIXED by Version RSS 4000 FIXED by Version Polycom Touch Control (PTC) FIXED by Version HDX FIXED by Version VVX & SoundStructure FIXED by Version SoundPoint & SoundStation FIXED by Version Group Series & Polycom Touch Control FIXED by Version CloudAXIS Edge Service & Edge Experience Portals FIXED by Version RSS 4000 FIXED by Version Capture Server FIXED by Version 1.7 CX 5100/5500 FIXED by Version RPAD FIXED by Version CSS Server & Client FIXED by Version RMX 4000/2000/1500 FIXED by Version RMX 1800/Collaboration Server, Virtual Edition FIXED by Version Platform Director Under Investigation
4 Mitigation Polycom recommends that customers use the latest versions of OpenSSL clients (0.9.8za, 1.0.0m, and 1.0.1h) to protect against CVE , CVE , CVE , CVE , and CVE In addition, Polycom recommends that customers evaluate network access control lists, firewalls and other network protections to ensure that they have been deployed in a manner that is consistent with security best practices. The risk presented by this potential vulnerability to Polycom products, as well as other networked devices, may be mitigated by these controls. Customers should also ensure that Polycom products have been configured as recommended by Polycom implementation guides. Customers may wish to implement additional event monitoring and review until such time that an update is installed. Solution As fixes become available for a given product, that information will appear in this bulletin in subsequent releases. Polycom will continue updating this bulletin until all fixes are in place. Polycom recommends that users of any Polycom product listed in the table above as being vulnerable update to the FIXED version of their product as soon as such a version becomes available. CVSS v2 Base Metrics: To assist our customers in the evaluation of this vulnerability; Polycom leverages the Common Vulnerability Scoring System (CVSS). This system provides an open framework for communicating the characteristics and impacts of information technology vulnerabilities that better enable our customers to make informed decisions and assess the impact on their environment. Base CVSS v2 Scores: CVE : 4.0 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE : 6.8 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE : 4.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE : 4.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE : 6.8 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE : 4.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE : 4.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) For more information on CVSS v2 please see: Severity: Medium Rating Critical High Definition A vulnerability, which, if exploited would allow malicious code to execute, potentially without a user being aware. A vulnerability, which, if exploited could impact the confidentiality, integrity, or availability of
5 data, or of the integrity or availability of resources. Medium Low A vulnerability that is limited to a significant degree by factors such as default configuration, auditing, or is difficult to exploit. A vulnerability that has minimal impact to the system and is extremely difficult to exploit. Contact Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Polycom Technical Support either call POLYCOM or visit: for the latest information. You might also find value in the high-level security guidance and security news located at: Revision History Revision Original publication: June 30, 2014 VBP Fix Announced Revision 1.1 Original publication: August 5, 2014 RPM, RPD, M100, CMAD, CSS, Group Series announced Revision 1.2 Original publication: September 15, 2014 HDX, 2014, Polycom, Inc. All rights reserved. Trademarks POLYCOM, the Polycom logo and all names and marks associated with Polycom and Polycom's products are trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States and various other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Polycom. Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document, Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for any typographical errors, out of date information, or any errors or omissions in the content of this document. Polycom reserves the right to change or update this document at any time. Individuals are solely responsible for verifying that they have and are using the most recent Technical Bulletin. Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Polycom has been advised of the possibility of such damages.
Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products
SECURITY BULLETIN CVE-2014-0160 Version 1.12 Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products DATE PUBLISHED: This information applies to all Polycom products
Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products
SECURITY BULLETIN CVE-2014-0160 Version 1.7 Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products DATE PUBLISHED: This information applies to all Polycom products using
Product Documentation. Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)
Product Documentation Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1) Contents Contents Copyright... 3 Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)...
Security Slots on Polycom SoundPoint IP, SoundStation IP, SoundStation Duo and VVX Series Phones
Security Slots on Polycom SoundPoint IP, SoundStation IP, SoundStation Duo and VVX Series Phones Have you ever needed to lock a phone down so it couldn t be removed? On certain Polycom phone models, you
GETTING STARTED GUIDE. 1.3 September 2015 3725-10306-001D. Polycom RealAccess
GETTING STARTED GUIDE 1.3 September 2015 3725-10306-001D Polycom RealAccess Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
Syslog on Polycom Phones
Syslog on Polycom Phones Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational, analytic, or
Using the Unified Call Appearance List
Feature Profile 72634 Using the Unified Call Appearance List Polycom UC Software Update With the release of Polycom UC Software 4.x, Polycom has updated the phones with the unified call appearance list
Technical Bulletin 5844
SIP Server Fallback Enhancements on Polycom SoundPoint IP, SoundStation IP, and VVX Phones This technical bulletin provides detailed information on how the SIP software has been enhanced to support SIP
Device Certificates on Polycom Phones
Feature Profile 37148 Device Certificates are an important element in deploying a solution that ensures the integrity and privacy of communications involving Polycom UC Software devices. Device Certificates
Connectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
Using Enhanced Feature Keys and Configurable Soft Keys on Polycom Phones
Using Enhanced Feature Keys and Configurable Soft Keys on Polycom Phones This feature profile provides detailed information on how to set up Enhanced Feature Keys (EFK) and Configurable Soft Keys on Polycom
Using Feature Synchronized Automatic Call Distribution with Polycom Phones
Using Feature Synchronized Automatic Call Distribution with Polycom Phones Feature Profile 57216 Feature synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of
Using Multiple Appearance Directory Number - Single Call Appearance with Polycom Phones
Using Multiple Appearance Directory Number - Single Call Appearance with Polycom Phones Feature Profile 83102 Multiple Appearance Directory Number Single Call Appearance (MADN-SCA) enables multiple phone
Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance
Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,
Using Premium Automatic Call Distribution for Call Centers
Using Premium Automatic Call Distribution for Call Centers Feature-synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of phone calls on an individual basis. ACD
Polycom RealPresence Access Director System
RELEASE NOTES Version 4.2 June 25, 2015 3725-78700-001F1 Polycom RealPresence Access Director System Polycom, Inc. 1 Polycom RealPresence Access Director System Release Notes Version 4.2 Contents What
Deploying and Configuring Polycom Phones in 802.1X Environments
Deploying and Configuring Polycom Phones in 802.1X Environments This document provides system administrators with the procedures and reference information needed to successfully deploy and configure Polycom
Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
Customizing the Display Background on Polycom VVX Business Media Phones
Customizing the Display Background on Polycom VVX Business Media Phones Feature Profile 62470 This feature profile provides users, system administrators, and service providers with step-by-step instructions
Polycom Unified Communications in RealPresence Access Director System Environments
Solution Deployment Guide Version 4.0 June 2014 3725-78704-001D Polycom Unified Communications in RealPresence Access Director System Environments Copyright 2014, Polycom, Inc. All rights reserved. No
RealPresence Platform: Installation, Configuration and Troubleshooting - RPIIT202
Polycom University RealPresence Platform: Installation, Configuration and Troubleshooting - RPIIT202 Course Description A blended program including self-study and classroom training that provides the knowledge
Provisioning with the Master Configuration File
Best Practices 35361 Provisioning with the Master Configuration File This document provides you with detailed information on provisioning your Polycom phones and, specifically, shows you two ways to use
Accessibility Features on Polycom Phones
s on Polycom Phones Polycom designs and builds products for people who have many and varied abilities. In this feature profile, you ll learn about the a ccessibility features available on Polycom SoundPoint
Configuring Optional Re-Registration on Failover Behavior
Engineering Advisy 66546 Configuring Optional Re-Registration on Failover Behavi This engineering advisy describes optional failover behavis that you can set up to enhance server redundancy technologies
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1.2 October 2014 3725-76312-001B Polycom RealPresence DMA 7000 System, Virtual Edition The Polycom RealPresence DMA 7000 System is also known and certified as the DMA System.
Edgewater Networks with Polycom RealPresence Platform and Phones
EDGEWATER NETWORKS Edgewater Networks with Polycom RealPresence Platform and Phones Version 1.1 Created by Edgewater Networks 1/2/13 The Partner Solutions Guide describes how Edgewater Networks and Polycom
WHITEPAPER. February 2014 3725-77704-001A. RealPresence One. Product Definition and Licensing. Polycom, Inc. 0
WHITEPAPER February 2014 3725-77704-001A RealPresence One Product Definition and Licensing Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Broadcasting Audio Messages with Group Paging and Push-to-Talk
Broadcasting Audio Messages with Group Paging and Push-to-Talk Group Paging enables you to broadcast one-way audio announcements to users who are subscribed to a specific page group. Push-to-Talk (PTT)
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
Technical Bulletin 11572
Changes to Local Digit Maps on SoundPoint IP, SoundStation IP, and Polycom VVX 1500 Phones This technical bulletin provides detailed information on how to modify the configuration files to automate the
Broadcasting Audio Messages with Group Paging and Push-to-Talk
Broadcasting Audio Messages with Group Paging and Push-to-Talk Feature Profile 62337 Group Paging enables you to broadcast one-way audio announcements to users who are subscribed to a specific page group.
Supporting the Calendar, Instant Messaging, and Presence Features on Polycom Phones
Supporting the Calendar, Instant Messaging, and Presence Features on Polycom Phones This engineering advisory shows you how to integrate Microsoft Outlook, Microsoft Office Communication Server 2007 R2,
Deploying Polycom SoundStation IP Conference Phones with Cisco Unified Communications Manager (CUCM)
Document Title Version SOLUTION GUIDE October 2013 1725-40120-002 Rev A Deploying Polycom SoundStation IP Conference Phones with Cisco Unified Communications Manager (CUCM) Polycom, Inc. 1 Copyright 2013,
How to Provision a Polycom Phone
Provisioning Guide How to Provision a Polycom Phone This guide shows you how to provision a Polycom phone with the minimum settings required to place and receive Voice over Internet Protocol (VoIP) calls
RealPresence Resource Manager System
RELEASE NOTES 8.3.2 March 2015 3725-72100-001 Rev L2 RealPresence Resource Manager System Polycom, Inc. 1 Contents What s New in Release 8.3.2... 3 Release History... 3 Products Tested with this Release...
Polycom Unified Communications in RealPresence Access Director System Environments
Solution Deployment Guide Version 4.1 December 2014 3725-78704-001E Polycom Unified Communications in RealPresence Access Director System Environments Copyright 2014, Polycom, Inc. All rights reserved.
Polycom RealPresence Access Director System
Release Notes 3.1 January 2014 3725-78700-001C Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1. This document provides
Polycom Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications October 2015 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
Engineering Advisory 48152 Power Consumption and Management on Polycom Phones
Consumption and Management on Polycom Phones This engineering advisory shows detailed information about the power consumption and management of the Polycom SoundPoint IP desktop phones, Polycom SoundStation
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1 June 2014 3725-76312-001A Polycom RealPresence DMA 7000 System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Using custom certificates with Spectralink 8400 Series Handsets
Using custom certificates with Spectralink 8400 Series Handsets This technical bulletin explains how to create and use custom certificates with the Spectralink 8400 Series Handset. This technical bulletin
Polycom VVX 300, 310, 400 and 410 Business Media Phone
ADMINISTRATORS GUIDE Software 4.1.4 March 2013 1725-49091-401 Rev A Polycom VVX 300, 310, 400 and 410 Business Media Phone Addendum to the Polycom UC Software 4.1.0 Administrators Guide i Polycom VVX 300,
Polycom Unified Communications Deployment Guide for Microsoft Environments
SOLUTION GUIDE Wave 7 January 2013 3725-00000-004 Rev A Polycom Unified Communications Deployment Guide for Microsoft Environments i Polycom Unified Communications Deployment Guide for Microsoft Environments
Polycom RealPresence Content Sharing Suite
RELEASE NOTES Version 1.1.1 3725-03262-001 Rev.D July 2013 Polycom RealPresence Content Sharing Suite i Trademarks 2013, Polycom, Inc. All rights reserved. POLYCOM, the Polycom logo and the names and marks
How To Use A Presence Desktop On A Pc Or Mac Or Ipad (For A Non-Profit) For Free
Help 3.3 December 2014 3725-69930-004/A Polycom RealPresence Desktop for Windows Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
Polycom recommends that all legacy phones be updated to the most recent patch of their last supported SIP and BootROM software versions.
This technical bulletin describes how to maintain older phones in deployments running software versions past their respective last supported releases. As of UC Software 3.3.0, the unsupported models include
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition 8.2.0 July 2014 3725-72102-001G Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
SECURITY COMPARISON BETWEEN IBM WEBSPHERE MQ 7.5 AND APACHE ACTIVEMQ 5.9
SECURITY COMPARISON BETWEEN IBM WEBSPHERE MQ 7.5 AND APACHE ACTIVEMQ 5.9 Author: Timothy N. Scaggs, IBM, March 2014 Edited: Rodney Thomas, IBM, June, 2015 Table of Contents Executive Summary... 2 IBM WebSphere
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP)
Deployment Guide for the Polycom SoundStructure VoIP Interface for Cisco Unified Communications Manager (SIP) UC Software 4.0.1 December 2011 1725-33223-001 Rev. A Trademark Information POLYCOM, the Polycom
Using Polycom VVX Business Media Phones with Microsoft Lync Server 2013
Using Polycom VVX Business Media Phones with Microsoft Lync Server 2013 Feature Profile 84538 Microsoft Lync on Polycom VVX business media phones enables you to communicate with customers, colleagues,
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
Polycom RealPresence DMA 7000 System
6.1 June 2014 3725-77312-001B Polycom RealPresence DMA 7000 System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format,
SPECIFIC TERMS AND CONDITIONS ON THE RENTAL OF A DEDICATED SERVER
SPECIFIC TERMS AND CONDITIONS ON THE RENTAL OF A DEDICATED SERVER Latest Version on May 22nd 2014 SECTION 1: PURPOSE The purpose of these Specific Terms and Conditions, which are complementary to OVH s
RealPresence Resource Manager System
RELEASE NOTES 8.4.0 July 2015 3725-72100-001 Rev M1 RealPresence Resource Manager System Polycom, Inc. 1 Contents What s New in Release 8.4... 3 Support for the RealPresence Group Series 310... 3 Subnet
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
SPECIFIC TERMS AND CONDITIONS ON THE RENTAL OF A KS (KIMSUFI) DEDICATED SERVER
SPECIFIC TERMS AND CONDITIONS ON THE RENTAL OF A KS (KIMSUFI) DEDICATED SERVER Latest Version on September 2nd 2014 SECTION 1: PURPOSE The purpose of these Specific Terms and Conditions, which are complementary
Polycom RealPresence Content Sharing Suite
ADMINISTRATORS GUIDE Version 1.1 3725-03260-001 Rev.C June 2013 Polycom RealPresence Content Sharing Suite i Polycom RealPresence Content Sharing Suite Administrators Guide Copyright 2013, Polycom, Inc.
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Security Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
Polycom RealPresence Content Sharing Suite Quick User Guide
Polycom RealPresence Content Sharing Suite Quick User Guide Version 1.0 3725-03261-001 Rev.B April, 2013 The Polycom RealPresence Content Sharing Suite (CSS) allows seamless video collaboration between
PortSIP Encryption Relay Server Deployment Guide
SOLUTION GUIDE Wave 3 Nov 2015 2998-000606-003 Rev A PortSIP Encryption Relay Server Deployment Guide 1 Copyright 2015, All rights reserved. No part of this document may be reproduced, translated into
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
Self Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
Polycom RealPresence Content Sharing Suite
ADMINISTRATORS GUIDE Version 1.0 3725-03260-001 Rev.A February, 2013 Polycom RealPresence Content Sharing Suite i Polycom RealPresence Content Sharing Suite Administrators Guide Copyright 2013, Polycom,
Polycom Unified Communications Deployment Guide for Microsoft Environments
SOLUTION GUIDE September 2013 3725-00675-002 Rev A Polycom Unified Communications Deployment Guide for Microsoft Environments Polycom, Inc. 1 Copyright 2013, Polycom, Inc. All rights reserved. No part
User Guide for Paros v2.x
Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping
Security Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Boundary Encryption.cloud Deployment Process Overview
Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones Polycom s SpectraLink 8400 Series wireless phones meet the highest security requirements. By the time you deploy
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Self Help Guides. Setup Exchange Email with Outlook
Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook
Polycom Unified Communications Deployment Guide for Cisco Environments
PARTNER SOLUTION GUIDE SP June 2013 3725-00010-001 Rev J Polycom Unified Communications Deployment Guide for Cisco Environments i Polycom Unified Communications Deployment Guide for Cisco Environments
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
Reverse Proxy Three Myths Busted
Reverse Proxy Three Myths Busted Discover the real facts about how reverse proxy enables enhanced security and IT efficiency. Written by Joe Campbell, Principal Solutions Architect, Dell Software Abstract
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Polycom Unified Communications for Microsoft Environments
SOLUTION DEPLOYMENT GUIDE December 2014 3725-06675-004 Rev A Polycom Unified Communications for Microsoft Environments Polycom, Inc. 1 Copyright 2014, Polycom, Inc. All rights reserved. No part of this
Polycom Visual Communications Architecture and Design Guide
Polycom Visual Communications Architecture and Design Guide Wave 2.5 November 2010 3725-00000-002B1 Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom
Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
IBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal)
SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal) Publishing Date 2012-01-24 Last Update 2012-01-24 Current Version V1.5 CVSS Overall Score 8.7 Summary: Multiple vulnerabilities
Update Configuration. Reboot Phone To upload files to assist in diagnostics, you can choose:
Updating, Troubleshooting, and Resetting SoundPoint IP, SoundStation IP, and VVX 1500 Phones This quick tip provides step-by-step instructions on how to use multiple key combinations and phone menu options
Introduction. Purpose. Background. Details
Introduction Recent media reports confirm that Secure Socket Layer (SSL) 3.0 is obsolete and insecure. This report provides guidance on how to ensure your communications use the more secure Transport Layer
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
