>
Trend Micro Incorporated November 27, 2017
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Trend Micro(TM) ServerProtect(TM) for Linux(TM) 3.0
Critical Patch - Build 1541
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contents
==========================================================
1. Overview of This Critical Patch Release
1.1 Issues
1.2 Files Included in This Release
2. Documentation Set
3. System Requirements
4. Installation
4.1 Installing
4.2 Uninstalling
5. Post-installation Configuration
6. Known Issues
7. Release History
8. Contact Information
9. About Trend Micro
10. License Agreement
==========================================================
1. Overview of This Critical Patch Release
======================================================================
This critical patch resolves several vulnerabilities and updates
the Apache(TM) server and its OpenSSL module in ServerProtect for
Linux 3.0.
NOTE: Please install this critical patch before completing any
procedure in this section (see "Installation").
1.1 Issues
===================================================================
This critical patch resolves the following issues and includes the
following enhancement:
Issue 1: The "log_management.cgi" file in ServerProtect for
Linux 3.0 is affected by a Cross-site Scripting (XSS)
vulnerability.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 1: This critical patch resolves this XSS vulnerability by
adding a checking mechanism to ensure that the data
for the HTTP GET/POST method is in the correct format.
-------------------------------------------------------------------
Issue 2: The "notification.cgi" file in ServerProtect for Linux
3.0 is affected by an XSS vulnerability.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 2: This critical patch resolves this XSS vulnerability by
adding a checking mechanism to ensure that the data
for the HTTP GET/POST method is in the correct format.
-------------------------------------------------------------------
Issue 3: Communication to the Active Update (AU) server is
unencrypted by default.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 3: This critical patch resolves this vulnerability by
enabling the AU server to encrypt the communication
using HTTPS.
-------------------------------------------------------------------
Issue 4: Packages downloaded from the AU server are not signed
or validated by default.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 4: This critical patch resolves this vulnerability by
enabling the Digital Signature Check and Server
Certificate Verification functions by default when
downloading components from the AU server.
-------------------------------------------------------------------
Issue 5: Users can set or add any path for the quarantine
directory.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 5: This critical patch resolves this vulnerability by
restricting the quarantine directory path to specific
paths only.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Procedure 5: To set or add the "/tmp" folder for the quarantine
directory:
a. Install this critical patch (see "Installation").
b. Open the "tmsplx.xml" file under the
"/opt/TrendMicro/SProtectLinux" folder using a text
editor.
c. In the "Scan" group of "tmsplx.xml", locate the
"MoveToWhiteList" string, the default string is as
follows:
d. Append ":/tmp" to the value:
NOTE: Removing ":/tmp" removes the restriction.
e. Save the changes and close the file.
-------------------------------------------------------------------
Issue 6: Users can set or add any path for the backup
directory.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 6: This critical patch resolves this vulnerability by
restricting the backup directory path to specific
paths only.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Procedure 6: To set or add the "/tmp" folder for the backup
directory:
a. Install this critical patch (see "Installation").
b. Open the "tmsplx.xml" file under the
"/opt/TrendMicro/SProtectLinux" folder using a text
editor.
c. In the "Scan" group of "tmsplx.xml", locate the
"SaveToWhiteList" string, the default string is as
follows:
d. Append ":/tmp" to the value:
NOTE: Removing ":/tmp" removes the restriction.
e. Save the changes and close the file.
-------------------------------------------------------------------
Issue 7: The ServerProtect for Linux 3.0 web console is
affected by a CSRF vulnerability.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 7: This critical patch resolves the CSRF vulnerability by
adding a secure random token for the web console.
-------------------------------------------------------------------
Issue 8: Some feedback data are generated in duplicate.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 8: This critical patch removes the duplicate feedback
data.
-------------------------------------------------------------------
Issue 9: The "Entity" process may trigger a high CPU usage
issue when users attempt to view Virus, Spyware, Scan,
or System logs on the web console and it encounters an
unexpected string in any of the logs.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 9: This critical patch resolves the issue by adding a
mechanism to handle unexpected strings and help ensure
that the "Entity" process runs normally.
-------------------------------------------------------------------
Issue 10: The TLS 1.0 protocol used in the web console is
affected by the weak CBC-Mode vulnerability.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Solution 10: This critical patch resolves the issue by disabling
TLS 1.0 in the web console by default.
NOTE: After applying this critical patch, if you cannot
login to the web console through a browser or Single
Sign-On (SSO) to it from Trend Micro Control
Manager(TM), upgrade your browser or apply the latest
Control Manger patch to enable it to support newer TLS
protocols.
-------------------------------------------------------------------
Enhancement: This critical patch updates the Apache server to
version 2.4.25 and its OpenSSL module to version
1.0.2k.
1.2 Files Included in This Release
===================================================================
A. Files for Current Issue
-------------------------------------------------------------------
Filename Build Number
-------------------------------------------------------------------
install.sh n/a
rollback.sh n/a
Patch.ini n/a
log_management.cgi 3.0.1541
proption.cgi 3.0.1541
scanoption_set.cgi 3.0.1541
showpage.cgi 3.0.1541
tmcm_sso.cgi 3.0.1541
cmoption.cgi 3.0.1541
login_and_register.cgi 3.0.1541
scanoption.cgi 3.0.1541
srv_admin.cgi 3.0.1541
viewlog.cgi 3.0.1541
notification.cgi 3.0.1541
summary.cgi 3.0.1541
CMconfig 3.0.1541
DiagnosticTool 3.0.1541
xmlvalidator 3.0.1541
entity 3.0.1541
vsapiapp 3.0.1541
splxmain 3.0.1541
splxhttpd 3.0.1541
splxhttpd.conf 3.0.1541
liblogrdr.so.1 3.0.1541
Specifying_the_Download_Source.htm 3.0.1541
summary.htm 3.0.1541
backup_directory.htm 3.0.1541
cmsettings_no_reg.htm 3.0.1541
cmsettings_reged.htm 3.0.1541
password.htm 3.0.1541
pr_activate.htm 3.0.1541
pr_activate_rej.htm 3.0.1541
pr_licenseinfo_full_ac_end.htm 3.0.1541
pr_licenseinfo_full_ac.htm 3.0.1541
pr_licenseinfo_full_ac_progress.htm 3.0.1541
pr_licenseinfo_no_ac.htm 3.0.1541
proxy_settings.htm 3.0.1541
proxy_settings_update.htm 3.0.1541
quarantine_directory.htm 3.0.1541
registration.htm 3.0.1541
exclusion_manual.htm 3.0.1541
exclusion_manual_response.htm 3.0.1541
exclusion_real.htm 3.0.1541
exclusion_real_response.htm 3.0.1541
exclusion_scheduled.htm 3.0.1541
exclusion_scheduled_response.htm 3.0.1541
script_splx.js 3.0.1541
log_directory.htm 3.0.1541
logs_on_disk.htm 3.0.1541
purge_now.htm 3.0.1541
scan_logs.htm 3.0.1541
spyware_logs.htm 3.0.1541
system_logs.htm 3.0.1541
virus_logs.htm 3.0.1541
Alerts.htm 3.0.1541
Recipients.htm 3.0.1541
Manual.htm 3.0.1541
Real-time.htm 3.0.1541
scan_progress0.htm 3.0.1541
scan_progress.htm 3.0.1541
Scheduled.htm 3.0.1541
Update_Manual.htm 3.0.1541
Update_Scheduled.htm 3.0.1541
B. Files for Previous Issues
-------------------------------------------------------------------
Not applicable.
2. Documentation Set
======================================================================
To download or view electronic versions of the documentation set
for this product, go to http://docs.trendmicro.com
In addition to this Readme file, the documentation set for this
product includes the following:
- Online Help: The Online Help contains an overview of features
and key concepts, and information on configuring and
maintaining ServerProtect.
To access the Online Help, go to http://docs.trendmicro.com
- Installation Guide (IG): The Installation Guide contains
information on requirements and procedures for installing and
deploying ServerProtect.
- Administrator's Guide (AG): The Administrator's Guide contains
an overview of features and key concepts, and information on
configuring and maintaining ServerProtect.
- Getting Started Guide (GSG): The Getting Started Guide
contains product overview, installation planning, installation
and configuration instructions, and basic information intended
to get ServerProtect "up and running".
- Support Portal: The Support Portal contains information on
troubleshooting and resolving known issues.
To access the Support Portal, go to
http://esupport.trendmicro.com
3. System Requirements
======================================================================
Install this critical patch only on computers protected by
ServerProtect for Linux 3.0 Patch 7 for Service Pack 1.
4. Installation
======================================================================
This section explains key steps for installing the critical patch.
4.1 Installing
===================================================================
To install:
1. Log on as a root user.
2. Upload and copy the critical file to a working directory.
For example, "/home/workdir."
3. Run the following command to extract the critical patch files
from the "tar.gz" file.
# tar zxvf splx_30_lx_en_criticalpatch1541.tar.gz
4. Go to the critical patch directory. Run the following command:
#./install.sh
The original files are backed-up in folder:
/opt/TrendMicro/SProtectLinux/backup/cp1541
4.2 Uninstalling
===================================================================
To roll back to the previous build:
1. Log on as a root user.
2. Go to the critical patch directory. Run the following command:
#./rollback.sh
All current files are replaced with the back up files generated
during installation.
3. Clear the cookies from the web browser.
NOTE: You can rollback ServerProtect only to the last build,
rollback to any older build is NOT supported.
5. Post-Installation Configuration
======================================================================
No post-installation steps are required.
NOTE: Trend Micro recommends that you update your scan engine and
virus pattern files immediately after installing the product.
6. Known Issues
======================================================================
There are no known issues for this critical patch release.
7. Release History
======================================================================
For more information about updates to this product, go to:
http://www.trendmicro.com/download
8. Contact Information
======================================================================
A license to Trend Micro software usually includes the right to
product updates, pattern file updates, and basic technical support
for one (1) year from the date of purchase only. After the first
year, you must renew Maintenance on an annual basis at
Trend Micro's then-current Maintenance fees.
Contact Trend Micro via fax, phone, and email, or visit our website
to download evaluation copies of Trend Micro products.
http://www.trendmicro.com/us/about-us/contact/index.html
NOTE: This information is subject to change without notice.
9. About Trend Micro
======================================================================
Smart, simple, security that fits
As a global leader in IT security, Trend Micro develops innovative
security solutions that make the world safe for businesses and
consumers to exchange digital information.
Copyright 2017, Trend Micro Incorporated. All rights reserved.
Trend Micro, ServerProtect, and the t-ball logo are trademarks of
Trend Micro Incorporated and are registered in some jurisdictions.
All other marks are the trademarks or registered trademarks of
their respective companies.
10. License Agreement
======================================================================
View information about your license agreement with Trend Micro at:
http://www.trendmicro.com/us/about-us/legal-policies/
license-agreements
Third-party licensing agreements can be viewed:
- By selecting the "About" option in the application user interface
- By referring to the "Legal" page of the Administrator's Guide