<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL/TLS: Renegotiation DoS Vulnerability in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2135488#M25980</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I will do update of&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Qlik Sense Enterprise on Windows to version August 2023.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And we will see.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pavel&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Nov 2023 15:36:12 GMT</pubDate>
    <dc:creator>Pajik3909</dc:creator>
    <dc:date>2023-11-07T15:36:12Z</dc:date>
    <item>
      <title>SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2131695#M25883</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;
&lt;P&gt;I received&amp;nbsp;information about the problem with renegotiation DoS Vulnerability from our IT department. See message below:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hostname:&lt;/STRONG&gt;&amp;nbsp;qlikxxxxxx,&lt;BR /&gt;&lt;STRONG&gt;Host Ip:&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Taskname:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt;&amp;nbsp;Low,&lt;BR /&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&amp;nbsp;SSL/TLS: Renegotiation DoS Vulnerability (CVE-2011-1473, CVE-2011-5094)&lt;BR /&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&amp;nbsp;The remote SSL/TLS service is prone to a denial of service (DoS) vulnerability.&lt;BR /&gt;&lt;STRONG&gt;Insight:&lt;/STRONG&gt;&amp;nbsp;The flaw exists because the remote SSL/TLS service does not properly restrict client-initiated renegotiation within the SSL and TLS protocols. Note: The referenced CVEs are affecting OpenSSL and Mozilla Network Security Services (NSS) but both are in a DISPUTED state with the following rationale: &amp;gt; It can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment. Both CVEs are still kept in this VT as a reference to the origin of this flaw.&lt;BR /&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&amp;nbsp;Users should contact their vendors for specific patch information. A general solution is to remove/disable renegotiation capabilities altogether from/in the affected SSL/TLS service.&lt;BR /&gt;&lt;STRONG&gt;Nvt:&lt;/STRONG&gt;&amp;nbsp;1.3.6.1.4.1.25623.1.0.117761&lt;BR /&gt;&lt;STRONG&gt;CVE:&lt;/STRONG&gt;&amp;nbsp;CVE-2011-1473, CVE-2011-5094&amp;gt;&lt;BR /&gt;&lt;STRONG&gt;Affected:&lt;/STRONG&gt;&amp;nbsp;Every SSL/TLS service which does not properly restrict client-initiated renegotiation.&lt;BR /&gt;&lt;STRONG&gt;Detection:&lt;/STRONG&gt;&amp;nbsp;Checks if the remote service allows to re-do the same SSL/TLS handshake (Renegotiation) over an existing / already established SSL/TLS connection.&lt;BR /&gt;&lt;STRONG&gt;Descriptions:&lt;/STRONG&gt;&amp;nbsp;The following indicates that the remote SSL/TLS service is affected:Protocol Version | Successful re-done SSL/TLS handshakes (Renegotiation) over an existing / already established SSL/TLS connection----------------------------------------------------------------------------------------------------------------------------------TLSv1.2 | 10&lt;BR /&gt;&lt;STRONG&gt;Soulution Type:&lt;/STRONG&gt;&amp;nbsp;VendorFix,&lt;BR /&gt;&lt;STRONG&gt;Reference:&lt;/STRONG&gt;&amp;nbsp;CVE-2011-1473; CVE-2011-5094; &lt;A href="https://mailarchive.ietf.org/arch/msg/tls/wdg46VE_jkYBbgJ5yE4P9nQ-8IU/" target="_blank" rel="noopener"&gt;https://mailarchive.ietf.org/arch/msg/tls/wdg46VE_jkYBbgJ5yE4P9nQ-8IU/&lt;/A&gt;; &lt;A href="https://orchilles.com/ssl-renegotiation-dos/" target="_blank" rel="noopener"&gt;https://orchilles.com/ssl-renegotiation-dos/&lt;/A&gt;; &lt;A href="https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation" target="_blank" rel="noopener"&gt;https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation&lt;/A&gt;; &lt;A href="https://www.openwall.com/lists/oss-security/2011/07/08/2" target="_blank" rel="noopener"&gt;https://www.openwall.com/lists/oss-security/2011/07/08/2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Does exist any solution for solving this problem?&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 21:18:16 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2131695#M25883</guid>
      <dc:creator>Pajik3909</dc:creator>
      <dc:date>2024-11-15T21:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2131871#M25885</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/166441"&gt;@Pajik3909&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What version of QlikView are your running that is being flagged on a vulnerability report from 12 years ago? If you run the currently supported versions of QlikView: May 2023 (12.80) or May 2022 (12.70), is this vulnerability flagged?&lt;/P&gt;
&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2023 16:52:19 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2131871#M25885</guid>
      <dc:creator>Chip_Matejowsky</dc:creator>
      <dc:date>2023-10-25T16:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132101#M25886</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We use these:&lt;/P&gt;
&lt;P&gt;"Qlik Sense May 2021", version 14.20.5&lt;/P&gt;
&lt;P&gt;"Qlik Sense Object Bundles", version&amp;nbsp;14.20.5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 11:15:45 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132101#M25886</guid>
      <dc:creator>Pajik3909</dc:creator>
      <dc:date>2023-10-26T11:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132162#M25887</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/166441"&gt;@Pajik3909&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Your first response refers to Qlik Sense versions, but your second response references QlikView.&amp;nbsp;Is this issue for QlikView or for Qlik Sense? Both?&lt;BR /&gt;&lt;BR /&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 13:49:39 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132162#M25887</guid>
      <dc:creator>Chip_Matejowsky</dc:creator>
      <dc:date>2023-10-26T13:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132171#M25888</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;we have Qlik Sense Enterprise. First response refers to this.&lt;/P&gt;
&lt;P&gt;best regards,&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 14:10:55 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132171#M25888</guid>
      <dc:creator>Pajik3909</dc:creator>
      <dc:date>2023-10-26T14:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132224#M25889</link>
      <description>&lt;P&gt;Thanks for confirming. You opened this thread in the &lt;EM&gt;&lt;STRONG&gt;QlikView &amp;gt; App Development&lt;/STRONG&gt;&lt;/EM&gt; forum so I will move it to the &lt;EM&gt;&lt;STRONG&gt;Qlik Sense &amp;gt; Deployment &amp;amp; Management&lt;/STRONG&gt;&lt;/EM&gt; forum so that it reaches its intended audience.&lt;/P&gt;
&lt;P&gt;Regarding the versions you reported - May 2021, please note that this version reached end of life for support assistance o May 10, 2023. Refer to Qlik Support article &lt;A href="https://community.qlik.com/t5/Product-Lifecycle/Qlik-Sense-Enterprise-on-Windows-Product-Lifecycle/ta-p/1826335" target="_self"&gt;&lt;STRONG&gt;Qlik Sense Enterprise on Windows Product Lifecycle&lt;/STRONG&gt;&lt;/A&gt; for more details. Suggest that you upgrade the Qlik Sense Enterprise instance to a supported version, such as August 2023 and see if this vulnerability is flagged.&lt;/P&gt;
&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 17:14:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2132224#M25889</guid>
      <dc:creator>Chip_Matejowsky</dc:creator>
      <dc:date>2023-10-26T17:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2135488#M25980</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I will do update of&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Qlik Sense Enterprise on Windows to version August 2023.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And we will see.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pavel&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 15:36:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2135488#M25980</guid>
      <dc:creator>Pajik3909</dc:creator>
      <dc:date>2023-11-07T15:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Renegotiation DoS Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2463880#M27496</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/13651"&gt;@Chip_Matejowsky&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;we use the Qlik Sense Enterprise on Windows version November 2023 Patch 1.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The vulnerability flagged is generated after installation version November 2023 Patch 1.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 13:47:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/SSL-TLS-Renegotiation-DoS-Vulnerability/m-p/2463880#M27496</guid>
      <dc:creator>Pajik3909</dc:creator>
      <dc:date>2024-06-19T13:47:41Z</dc:date>
    </item>
  </channel>
</rss>

