Earlier this week, you may have heard news about the Heartbleed Bug, which is a serious vulnerability in certain versions of the OpenSSL cryptographic software library. More information regarding the Heartbleed Bug can be found on the following website:
What versions of OpenSSL are vulnerable?
The Heartbleed Bug affects versions of OpenSSL starting with 1.0.1 up to and including 1.0.1f.
Are any JAMF Software products and services affected?
This vulnerability does not appear affect Apple devices (OS X or iOS) and does not affect any of the following JAMF Software products:
- JAMF Software Server (JSS) on OS X, Linux or Windows
- jamf binary
- Casper Suite applications, including: Casper Admin.app, Casper Imaging.app, Casper Remote.app, Composer.app, Recon.app, Recon.exe
- JAMF Distribution Server (JDS) on OS X
The following JAMF Software services were confirmed to be relying on a vulnerable version of OpenSSL:
- JAMF Nation
- JAMF Cloud JSS Hosting
- JAMF Distribution Server (JDS) on Linux
- NetBoot/SUS Appliance OVA versions 2.0 and 3.0
What have we done to fix this issue?
All vulnerable services that are maintained by JAMF, including JAMF Nation and the JAMF Hosting infrastructure, have been updated to use the latest version of OpenSSL and new SSL certificates have been installed.
What do you need to do?
If you are using a JAMF Distribution Server (JDS) on a supported installation of Linux or utilizing a NetBoot/SUS Appliance version 2.0 or 3.0, we have determined that the version of OpenSSL used would be vulnerable. Information for vendor specific recommendations should be followed for updating OpenSSL as soon as possible:
- Ubuntu - http://askubuntu.com/questions/444702/how-to-patch-the-heartbleed-bug-cve-2014-0160-in-openssl
- Red Hat Enterprise Linux - https://access.redhat.com/site/solutions/781793
- Amazon Web Services - http://aws.amazon.com/security/security-bulletins/aws-services-updated-to-address-openssl-vulnerability/
- Rackspace - http://www.rackspace.com/blog/protect-your-systems-from-heartbleed-openssl-vulnerability/
- Akamai - https://blogs.akamai.com/2014/04/heartbleed-faq-akamai-systems-patched.html
Existing SSL certificates should also be replaced once a patched version of OpenSSL has been installed.
How can you stay informed on any new developments?
This post will be updated, as necessary, to include any new information.
There is also an existing discussion for you to share your results and insights:
https://jamfnation.jamfsoftware.com/discussion.html?id=10259
As you know, we take security seriously at JAMF Software. If you have any questions or concerns, please feel free to contact me directly by email at jason.vanzanten@jamfsoftware.com or by phone at (715) 563-7895.
Sincerely,
Jason Van Zanten
Information Security Specialist
(715) 563-7895
jason.vanzanten@jamfsoftware.com