Security Bulletin for Oria SECURITY BULLETIN ID: 16-0007-009 RELEASE VERSION: 1.0 DATE: 2016-05-02 SECURITY BULLETIN 16-0007-009 V1.0 OVERVIEW This security bulletin provides product-specific details on the vulnerability described in Mitel Security Advisory 16-0007. Visit http://www.mitel.com/security-advisories for more details. Oria has been confirmed as being affected by a DNS libresolv vulnerability in glibc (CVE-2015-7547). Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. APPLICABLE PRODUCTS This security bulletin provides information on the following products: PRODUCT NAME VERSION(S) AFFECTED SOLUTION(S) AVAILABLE Oria Oria 4.0, 4.0 SP1 (188.8.131.52, 184.108.40.206) Upgrade MSL to 10.1.49.0 RISK / EXPOSURE Below are the CVSS scores as published by the vendor: CVSS V2.0 OVERALL SCORE: 6.8 CVSS V2.0 VECTOR: AV:N/AC:M/Au:N/C:P/I:P/A:P CVSS BASE SCORE: 6.8 CVSS TEMPORAL SCORE: Not defined CVSS ENVIRONMENTAL SCORE: Not defined OVERALL RISK LEVEL: Moderate MITIGATION / WORKAROUNDS There is no specific mitigation for the vulnerabilities apart from updating the glibc version on the MSL platform. SOLUTION INFORMATION A new release of MSL is available, which provides the fix for this vulnerability. Customers are advised to update to MSL 10.1.49.0. Customers are advised to contact Product Support for more information. © Copyright 2016, Mitel Networks Corporation. All Rights Reserved. The Mitel word and logo are trademarks of Mitel Networks Corporation. Any reference to third party trademarks are for reference only and Mitel makes no representation of the ownership of these marks.