Access Manager 4.0 Service Pack 1 Hotfix 3 Release Notes

December 2014

Access Manager 4.0 Service Pack 1 Hotfix 3 (4.0.1 HF3) supersedes Access Manager 4.0 Service Pack 1 Hotfix 2.

For the list of software fixes and enhancements in the previous release, see Access Manager 4.0 SP1 HF2 Release Notes

IMPORTANT:Installing this patch comprises of the following steps:

  1. After you have downloaded and saved the patch file, extract the patch file using the unzip <patch name>.zip command, where <patch filename> is the name of the patch file, for example, AM_401_HF3.

  2. Run the sh installPatch.sh command to install the patch and the bundled binaries.

    To resolve any errors during installation of the patch, see TID 7016005.

1.0 What’s New?

This release includes the following platform updates and fixed issues:

1.1 Updates for Dependent Components

In this release, the following dependent components are updated to fix the vulnerability issues:

  • eDirectory 8.8 SP8 Patch 4

  • iManager 2.7 SP7 Patch 3

  • Java 1.7.0.72

  • OpenSSL 101j

IMPORTANT:In this release of Access Manager, you must manually upgrade, eDirectory, iManager and Java. For more information about upgrading to the version supported by this Hotfix, see Section 1.2, Upgrading Dependent Components Manually

1.2 Upgrading Dependent Components Manually

Perform the following steps to upgrade eDirectory, iManager and Java manually:

Upgrading eDirectory Manually

Linux:

  1. Traverse to /opt/novell/nam/update/HF3/ folder.

  2. Execute patchEdir.sh script.

Windows:

  1. Traverse to C:/Program Files (x86)/Novell/update/HF3 folder.

  2. Open the edir_update_readme.txt file and follow the instructions to manually update eDirectory.

Upgrading iManager Manually

Linux:

  1. Traverse to /opt/novell/nam/update/HF3/ folder.

  2. Execute patchiMan.sh script.

Windows:

  1. Traverse to C:/Program Files (x86)/Novell/update/HF3 folder.

  2. Open the iman_update_readme.txt file and follow the instructions to manually update eDirectory.

Upgrading Java Manually

On Linux, the Java version is 1.7.0.72. No manual steps are required to update the version of Java.

Windows:

  1. Traverse to C:/Program Files (x86)/Novell/update/HF3 folder

  2. Open the jre_update_readme.txt file and follow the instructions to manually update Java.

1.3 Fixed Issues

This release includes software fixes in the following components:

Administration Console

The following issues are fixed in the Administration Console:

Cross-Site Scripting Vulnerability Issue in JSP Pages

Issue: Multiple cross-site vulnerabilities exist in debug.jsp page. The affected URLs are:

  • https://<host>:8443/roma/jsp/debug/debug.jsp?xss=%3Cscript%3Ealert%28%27xss%27%29%3C/script%3E

  • https://<host>/sslvpn/applet_agent.jsp?lang=%22%3E%3Cscript%3Ealert%28%27xss%27%29%3C/script%3E

Fix: This issue is resolved by sanitizing .jsp pages in the affected URLs. [Bug 906241][CVE-2014-5214]

Cross-Site Scripting Issue Injects Script to the Auditing Page

Issue: The Auditing page is vulnerable to cross-site scripting attacks. The affected URL is:

https://<host>:8443/roma/system/cntl?handler=dispatcher&command=auditsave&&secureLoggingServersA='){}};alert('xss');function+x(){if('&port=1289

Fix: This the issue is resolved by sanitizing the affected URL. [Bug 904689][CVE-2014-5216]

JSP Pages Display Sensitive Information to an Authenticated Administrator

Issue: An administrator can view internal credential details by using specific .jsp pages. The affected URLs are:

  • https://<host>:8443/roma/jsp/volsc/monitoring/dev_services.jsp

  • https://<host>:8443/roma/jsp/debug/debug.jsp

Fix: This issue is resolved by decrypting the credential information in the affected URLs and the details are not displayed to the administrator. [Bug 904677][CVE-2014-5215]

Identity Server

The following issues are fixed in the Identity Server:

Cross-Site Scripting Vulnerability Issue in the JSP Page

Issue: Multiple cross-site scripting vulnerabilities exist in the x509err.jsp page of the following URL:

https://<host>/nidp/jsp/x509err.jsp?error=%3Cscript%3Ealert%28%27xss%27%29%3C/script%3E

Fix: This issue is resolved by sanitizing the x509err.jsp page in the affected URL. [Bug 904675][CVE-2014-5216]

Cross-Site Scripting Vulnerability Issue With the WS-Federation Authentication Process

Issue: Cross-site scripting vulnerability affects the WS-Federation authentication process in the following URL:

cbcxt=&popupui=&vv=&username=fumail01%40basf.com&mkt=&lc=&wfresh=&wa=wsignin1.0&wtrealm=urn:federation:MicrosoftOnline&wctx=ernw"><script>alert

Fix: This issue is resolved by replacing the .jsp file in the affected URL. [Bug 903062]

JCC Port 1443 Accepts SSLv3 Requests

Issue: In the Identity Server, the JCC port 1443 is affected by POODLE vulnerability as it accepts SSLv3 requests. (CVE-2014-3566)

Fix: This release fixes the POODLE vulnerability by disabling SSLv3 requests on the JCC port 1443. [Bug 903876]

Access Gateway

The following issue is fixed in the Access Gateway:

JCC Port 1443 Accepts SSLV3 Requests

Issue: In the Access Gateway, the JCC port 1443 is affected by Poodle vulnerability as it accepts SSLv3 requests. (CVE-2014-3566)

Fix: This release fixes the Poodle vulnerability by disabling SSLv3 requests on the JCC port 1443. [Bug 903876]

2.0 Upgrading to 4.0.1 HF3

IMPORTANT:Ensure that you are currently on Access Manager 4.0 Service Pack 1, 4.0.1 HF1, or 4.0.1 HF2 before upgrading to Access Manager 4.0.1 HF3.

To upgrade to Access Manager 4.0.1 HF3, perform the below steps:

  1. Go to NetIQ Downloads Page.

  2. Under Patches, click Search Patches.

  3. Specify AM_401_HF3.zip in the search box and download the file.

  4. Save the hotfix file to the server running Access Manager. If you have multiple servers in your set up, ensure that you copy this .zip file to all the servers.

  5. Extract the patch file using the unzip <patch name>.zip command, where <patch filename> is the name of the patch file, for example, AM_401_HF3. For more information about the upgrade process, see Upgrading Access Manager 4.0 HF* Using the Patch Process for Linux or Upgrading Access Manager 4.0 HF* Using the Patch Process for Windows in the NetIQ Access Manager 4.0 SP1 Migration and Upgrade Guide.

  6. Run the sh installPatch.sh command. This command installs the patch and the bundled binaries.

3.0 Verifying Version Numbers

To ensure that you have the correct version of files before you upgrade to Access Manager 4.0.1 HF3, verify the version of existing Access Manager installation.

Before Upgrading:

Perform the below steps:

  1. In the Administration Console, click Access Manager > Auditing > Troubleshooting > Version.

  2. Verify that the Version field displays the following version.

Components

4.0.1

4.0.1 HF1

4.0.1 HF2

All Access Manager Components

4.0.1.88

4.0.1.88 + HF1-93

4.0.1.88 + HF1-93, HF2-107

After Upgrading:

Perform the below steps:

  1. In the Administration Console, click Access Manager > Auditing > Troubleshooting > Version.

  2. After upgrade, the following Version field must be displayed:

    Components

    Upgrading from 4.0.1

    Upgrading from 4.0.1 HF1

    Upgrading from 4.0.1 HF2

    All Access Manager Components

    4.0.1.88 + HF3 -132

    4.0.1-88 + HF1-93, HF3-132

    4.0.1-88 + HF1-93, HF2-107, HF3-132

4.0 Known Issues

NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.

4.1 Cross-Site Request Forgery Script Allows Password of an Authentication Administrator to be Changed

Issue: An attacker can issue a GET request and change the password of an authentication administrator. [CVE-2014-5217]

Workaround: This issue will be fixed in the next release of NetIQ Access Manager. For more information, see TID 7015997

4.2 Cross-Site Scripting Vulnerability Allows Attacks on URLs

Issue: Cross-Site scripting vulnerability affects the following URLs: [CVE-2014-5216]

  • https://<host>:8443/nps/servlet/webacc?taskId=dev.Empty&merge=dm.GenericTask&location=/roma/jsp/admin/view/main.jss'%2balert+('xss')%2b'

  • https://<host>:8443//nps/servlet/webacc?taskId=debug.DumpAll&xss=%3Cimg%20src=%22/404%22%20onerror=%22alert+%28%27xss%27%29%22%3E

Workaround: This issue will be fixed in the next release of NetIQ Access Manager. For more information, see TID 7015994

5.0 Contact Information

Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.

For detailed contact information, see the Support Contact Information Web site.

For general corporate and product information, see the NetIQ Corporate Web site.

You can post feedback in the Access Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and product user groups.

To download this product, go to Access Manager on the All Products Page.