<<<>>> Trend Micro Incorporated February 27th, 2019 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(TM) InterScan Web Security Virtual Appliance 6.5 - Service Pack 2 - Patch 4 English - Linux - 64 Bits Critical Patch Build 1852 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contents ============================================================================== 1. Critical Patch Release Information 1.1 Resolved Known Issues 1.2 Enhancements 1.3 Files Included in This Release 2. Documentation Set 3. System Requirements 4. Installation/Uninstallation 4.1 Installing 4.2 Uninstalling 5. Post-installation Configuration 6. Known Issues 7. Release History 7.1 Prior Hotfixes 8. Contact Information 9. About Trend Micro 10. License Agreement ============================================================================== 1. Critical Patch Release Information ============================================================================== 1.1 Resolved Known Issues ============================================================================ This Critical Patch resolves the following issue(s): (VRTS-3029) Issue: An Administrator Credential Disclosure vulnerability affects the "Administrator > IWSVA Configuration > Control Manager Server Setting" page of the InterScan Web Security Virtual Appliance (IWSVA) 6.5 Service Pack 2 EN web console. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: This critical patch removes the vulnerability. 1.2 Enhancements ============================================================================ There are no enhancements for this Critical Patch release. 1.3 Files Included in This Release ============================================================================ A. Files for Current Issue ---------------------------------------------------------------- Filename Build No. ---------------------------------------------------------------- libdaemon.so 1852 svcmonitor 1852 isdelvd 1852 Files for Issue ---------------------------------------------------------------- Filename Build No. ---------------------------------------------------------------- IWSSGui.jar 1852 tmcm_agent_settings.jsp 1852 B. Files for Previous Issues ---------------------------------------------------------------- patch_action_extra.sh 1847 replication_config.jsp 1847 replication_choice.jsp 1847 IWSSGui.jar 1847 libcommonldap.so 1847 dtasagent 1849 IniRecover.sh 1849 inspection_filter_list.jsp 1849 application_control_policy_account.jsp 1849 application_control_section_policy_exceptions.jsp 1849 application_control_section_policy_rule.jsp 1849 IWSSPIDpi.so 1849 rule_file_va6.5sp2_to_va6.5sp2.xml 1849 2. Documentation Set ============================================================================== To download or view electronic versions of the documentation set for this product, go to http://docs.trendmicro.com - Online Help: The Online Help contains an overview of features and key concepts, and information on configuring and maintaining the product. To access the Online Help, go to http://docs.trendmicro.com - Installation Guide (IG): The Installation Guide contains information on requirements and procedures for installing and deploying the product. - Administrator's Guide (AG): The Administrator's Guide contains an overview of features and key concepts, and information on configuring and maintaining the product. - Getting Started Guide (GSG): The Getting Started Guide contains product overview, installation planning, installation and configuration instructions, and basic information intended to get the product 'up and running'. - Support Portal: The Support Portal contains information on troubleshooting and resolving known issues. - To access the Support Portal, go to http://esupport.trendmicro.com 3. System Requirements ============================================================================== 1. Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 - Patch 4 Build 1844 - English - Linux - x64 4. Installation/Uninstallation ============================================================================== This section explains key steps for installing the Critical Patch. 4.1 Installing ============================================================================ To install: 1. Download the "iwsva_65_sp2_ar64_en_criticalpatch_b1852.tgz" hotfix file to your local hard disk. 2. Log on to the IWSVA admin console GUI. 3. Go to the "Administration > System Updates" page. 4. Click "Browse". 5. Browse your local hard disk for the "iwsva_65_sp2_ar64_en_criticalpatch_b1852.tgz" hotfix file and click "Open". 6. Click "Upload". Your browser uploads the hotfix file to IWSVA which validates if the file is a legitimate hotfix. 7. Click "Install" to apply the hotfix and update IWSVA to build 1852. The HTTP and FTP services in IWSVA restart automatically. 8. Clear the browser cache. NOTE: Applying this hotfix interrupts the HTTP and FTP services for several minutes. Plan appropriately for this downtime. 4.2 Uninstalling ============================================================================ To roll back to the previous build: 1. Log on to the IWSVA admin console GUI. 2. Go to the "Administration > System Updates" page. 3. Click "Uninstall" next to "hfb1852" and verify the hotfix ID and description in the confirmation page that appears. 4. Click "Uninstall" to remove Hotfix 1852 and rollback IWSVA to the previous build. The HTTP and FTP services in IWSVA restart automatically. NOTE: Removing this hotfix interrupts the HTTP and FTP services for several minutes. Plan appropriately for this downtime. 5. Post-installation Configuration ============================================================================== No post-installation steps are required. NOTE: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product. 6. Known Issues ============================================================================== Known issues in this release: #1 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] This happens when IWSVA uses multiple authentication servers, and the Active Directory domain is configured before any other type of server. To fix this known issue, delete the Active Directory domain only, and configure it again. #2 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] This known issues happens because the squid service uses the "/etc/squid/squid.conf" configuration file. Therefore, the Scheduled Configuration Replication is unable to update this configuration file. To resolve this known issue, Trend Micro recommends using manual replication method. #3 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] This known issue occurs on the latest R420 version, where the openVA kernel does not support the latest CPU. You may ignore this warning message to complete the IWSVA installation. #4 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] Some applications use HTTPS. Under this scenario, HTTPS decryption for this app URL must be enabled, otherwise, HTTPS-based applications cannot be blocked. For example, Yahoo mail uses HTTPS for Internet Explorer 10, Firefox 23, and Chrome 30.0. To keep granular application control working, an HTTPS decryption policy must be set. 1. Add a customized category in "HTTP > Configuration > Customized Categories". For example, "appcontrol". Add the application's connection URLs and URL keywords. 2. Enable HTTPS decryption and select a category to be decrypted. Such as: "HTTPS Decryption > Policies", enable "HTTPS Decryption". Select the URL category for "appcontrol" to be decrypted. #5 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] If LDAP authentication is enabled in the bridge or WCCP mode, HTTPS requests will not trigger an LDAP query. If there are no HTTP requests to do an LDAP authentication on before the HTTPS is requested to set up the IP-user cache, HTTPS will not be able to do the user-based policy match. It will use "IP" or "Unknown" as the username. #6 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] Log server mode triggers only log sources sending logs to the log server. For related configurations, log filtering settings, anonymous logging, and HTTPS tunneling settings will not take effect on the log sources as their configurations cannot be automatically synchronized between log servers and log sources. If those features are needed, it is strongly recommended to use replication configuration and make the log server a configuration replication source as well. Use the "Manual Replication," and select "Policy & Configuration Replication" to sync both policies and configurations from the log server to the log sources. #7 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] HTTPS Decryption Limitation 1. When visiting HTTPS sites by IP address in bridge mode, the HTTPS requests will be tunneled. The workaround is to change the "client_hello_no_host_tunnel=no" key in the "intscan.ini" file. 2. For Windows XP+IE8, HTTPS will not do decryption in bridge mode. The workaround is to change the "client_hello_no_host_tunnel=no"key in the "intscan.ini" file. #8 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] When Directory Settings are configured, IWSVA synchronizes with the listed LDAP server every 24 hours. When an LDAP user/group is added to the directory server, the change takes effect when the next synchronization cycle begins. For faster synchronization with the LDAP server, do a Manual Sync with the LDAP server. * On the "User Identification" page, click the "Sync with LDAP servers" button. #9 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] Firefox users see a certification exception dialog when attempting to access HTTPS URLs with an IPv6 address in DNS. Workarounds include: * Use the host name of the IPV6 server. * Do not use the IP address to access HTTPS-related IPV6 web sites. * Use IE or Chrome web browsers to access the site. #10 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] In reverse proxy mode, traffic cannot be forwarded to IPv6 servers with a link-local address. End-users cannot access the web server and will not be protected by IWSVA. The workaround is to use a global IPV6 address for the protected server behind IWSVA. #11 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] If a DNS server has both IPV4 and IPV6 addresses, IWSVA will connect to it without any problems. #12 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] Safari has a more stringent certificate-checking mechanism and does not accept IWSVA Captive Portal's default certificate. Workaround: Do not use Safari to surf the Internet through IWSVA, or deactivate cookie mode. #13 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] The "show network interfaces status" command is a function of IWSVA CLISH. It helps an administrator check the current interface status. If the administrator does not type anything in CLISH within 900 seconds, CLISH cannot quit the usual way through the console. The administrator can use the "killall" and "shownic" commands to quit. To stop the current timeout process: 1. Change to another console by pressing ALT+F2. 2. Use the following "killall" command to end the timeout process. `killall -9 shownic` #14 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] When IWSVA 6.0 is deployed on an IBM X360 or HP 380G5, the system event log generated by the BMC agent on these devices cannot be read by IWSVA. This will lead to inaccurate hardware status log information being exported through the syslog and SNMP. #15 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] This issue occurs when IWSVA 6.0 is connected to a switch at the same time another machine is connected to the same switch. That machine's MAC IP address will float between its real port and the IWSVA port. This only occurs in the Transparent Bridge mode. To fix this issue, add the MAC address filter option. To do this, access the "/etc/iscan/network.ini" file using the CLISH tool, and run one of the following commands: * add mac_filter=[mac address which you want to skip] or * add mac_filter!=[mac address which you want to scan] Then, type the command `service network restart` on console. #16 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] The Application Control feature only blocks new connections to the protocols specified in a new policy. If you deploy a new policy to block Skype after being logged on to Skype, then Skype is not blocked. However, if you log off Skype and then log on again, the policy works, and Skype is blocked. #17 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] This is caused by the time quota implementation method. The default quota unit is five minutes. Trend Micro recommends that administrators set the "Time quota" value to a multiple of five. Otherwise, IWSVA ignores the remainder if it is less than five. For example, if the value is set to four minutes, IWSVA interprets that as zero minutes. If the value is set to nine minutes, IWSVA interprets that as five minutes. The time quota setting depends on the system time. For example, if it is now 10:03 and the time quota = 5, the end user could only have access for two minutes. That happens because the time quota is split into five-minute increments (10:00-10:05, 10:05-10:10, etc.). Every five minutes, a new increment begins. #18 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] When you install IWSVA on a VMware ESX Virtual Machine, occasionally you might see the following error message: "Memory for crash kernel (0x0 to 0x0) not within permissible range" This message is normal and safe to ignore. #19 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] If the machine cannot find a storage controller, the installer will check if the storage controller exists. If the storage controller does not exist, the installation will fail even if the minimum hardware requirements for memory and disk are met. The workaround is to skip the hardware check. To skip the hardware check: 1. When the "Minimum hardware requirements were not met" message is displayed, click "Next". 2. When the installation menu page appears, press "Tab" to open a command line. 3. Type "nohwfail" and press "Enter" to continue installing IWSVA. #20 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] The IWSVA FTP daemon modifies the contents of the package in user mode. Some critical parts of the FTP packets that are usually recognized are changed. This change prevents the application signature engine from recognizing the data, and it will be marked as "Unclassified." The only way to avoid this issue at this time is to disable FTP scanning. #21 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] For example, the HTTP connection will be reset by IWSVA if a browser keeps posting a large file and ignoring the HTTP 403 block page notification from IWSVA. In another example, the Google search page does not show any response if the query is blocked by the IWSVA query keyword filter. This happens when the Google search setting "Use Google Instant predictions and results appear while typing" is enabled. This is because the Google page uses AJAX to query data with a private format, not normal HTML. As a result, it ignores the IWSVA 403 block notification page. The block page is displayed correctly after "Google Instant" is disabled. In these examples, the HTTP Inspection filter is working correctly, content is blocked, but the user may not receive feedback explaining why the content is blocked because the browser cannot display the IWSVA notification. #22 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] If the time zone is UTC+4:30 or UTC+5:45, which is not the top of the hour. The data present on dashboard or log query data and raw log data might not sync with each other, but the log in database are correct. #23 Known Issue: [Reported at: IWSVA 6.5.0 GM B1200] When deployed in the Proxy Chain, the application control daemon cannot get the source IP to match the policy. This is a limitation. #24 Known Issue: [Reported at: IWSVA 6.5.1 Service Pack 1 B1080] This happens because the web console uses the HTTPS channel by default, and the Web browser is unable to download the PAC file. This known issue occurs if the client Web browser does not import the security certificate from the IWSVA web console, or the security certificate "host name" and "common name" do not match. To work around this issue, do the following: 1. Log on to the IWSVA web console, and navigate to the following location: "Administration > Network Configuration > Web Console". 2. Select Non-SSL mode, and click "Save" to save the settings. The web console redirects to the new URL (http://[iwsva_IP_address]:1812). 3. Update the download location for the PAC file in the web browser. To get the PAC file location, navigate on IWSVA web console to: "Administration > IWSVA Configuration > PAC Files Management". #25 Known Issue: [Reported at: IWSVA 6.5.2 Service Pack 2 B1548] IWSVA bandwidth control is implemented via Linux's traffic control subsystem, while content cache transfers the upstream traffic via the logical network interface, lo, which is not controlled by traffic control. As such, IWSVA bandwidth control does not control the upstream traffic which, instead, directs through lo. To work around this issue, disable content cache, and configure Apache Traffic Server (ATS) as an upstream proxy for IWSVA. #26 Known Issue: [Reported at: IWSVA 6.5.2 SP2 - Patch 4 B1849] In order to resolve an issue, the dynamic certificates rule during Certification Replication has been modified. If you are using Configuration Replication, when installing hotfix 1837 or a later hotfix/patch, please upgrade the CCR Receiver first, then upgrade the CCR Source. If you have upgraded the CCR Source first, please use the steps below to copy the dynamic certificates to the Receivers: 1. WinSCP into the CCR Source > Download all files from /var/iwss/jscan/certificates/dynamic to a directory on the local machine 2. SSH into the CCR Receiver > Stop the IWSVA services: # /var/iwss/rcIwss stop (Note: this will interrupt the network traffic for a few minutes so plan accordingly) 3. WinSCP into the CCR Receiver > Upload all downloaded files to /var/iwss/jscan/certificates/dynamic 4. SSH into the CCR Receiver > Run the commands: chown iscan:iscan /var/iwss/jscan/certificates/dynamic/* /var/iwss/rcIwss start 7. Release History ============================================================================== For more information about updates to this product, go to: http://www.trendmicro.com/download 7.1 Prior Hotfixes ============================================================================ Only this hotfix was tested for this release. Prior hotfixes were tested at the time of their release. [Hotfix 1850] (SEG-41955) Issue: Corruption of the dtas.ini file may occur periodically. As a workaround, the corrupted dtas.ini file needs to be replaced manually each time the corruption occurs. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: This hotfix resolves the issue. [Hotfix 1849] (SEG-41483) Issue 1: Users cannot save the Trend Micro Deep Discovery Analyzer setting in InterScan Web Security Virtual Appliance (IMSVA) 6.5 Service Pack 2 Patch 4. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This hotfix ensures that the Deep Discovery Analyzer setting can be saved without issues. (SEG-41832) Issue 2: The HTTP inspection filter cannot import files. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This hotfix enables the HTTP inspection filter to import files. Enhancement: This hotfix adds a way to enables the Application Control exception list. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure: To enable the Application Control exception list: 1. Install this hotfix (see "Installation"). 2. Open the "WEBUI/etc/iscan/intscan.ini" file. 3. Add the following key in the "app-control" section and set it to "yes". [app-control] enable_app_exceptlist=yes 4. Save the changes and close the file. 5. Restart the WEBUI service by running the following command: /etc/iscan/S99IScanHttpd restart [Hotfix 1847] (SEG-39546) Issue 1: The "Enable TMCM SO Sync" button in the "HTTP > Advanced Thread Protection > Custom Defense > Custom Defense Setting" page is disabled since InterScan Web Security Virtual Appliance (IWSVA) 6.5 was upgraded from Patch 2 to Patch 3. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This hotfix enables the "Enable TMCM SO Sync" button on the page. (SEG-39863) Issue 2: In version 56 and any higher version of Mozilla(R) Firefox(R), the "Administration > IWSVA Configuration > Replication Configuration" page cannot show a required pop-up page after users click on the "Replicate Now" button. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This hotfix resolves the issue. (SEG-39015) Issue 3: LDAP round-robin do not work ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 3: This hotfix resolves the issue. 8. Contact Information ============================================================================== A license to Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, you must renew Maintenance on an annual basis at Trend Micro's then-current Maintenance fees. Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products. http://www.trendmicro.com/us/about-us/contact/index.html NOTE: This information is subject to change without notice. 9. About Trend Micro ============================================================================== Smart, simple, security that fits As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. Copyright 2019, Trend Micro Incorporated. All rights reserved. Trend Micro, InterScan Web Security Virtual Appliance, and the t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 10. License Agreement ============================================================================== View information about your license agreement with Trend Micro at: http://www.trendmicro.com/us/about-us/legal-policies/license-agreements/ Third-party licensing agreements can be viewed: - By selecting the "About" option in the application user interface - By referring to the "Legal" page of the Administrator's Guide