<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Palo Alto Networks Security Advisories [20-July-2017] in PSIRT Articles</title>
    <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-20-july-2017/ta-p/167560</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;P&gt;Palo Alto Networks has published 3 new and 2 updated Security Advisory addressing several security issue to &lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_self"&gt;https://securityadvisories.paloaltonetworks.com/&lt;/A&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Security Advisories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0021 - Vulnerability in the PAN-OS DNS Proxy&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Critical Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.10, PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;Affects DNS Proxy of PAN-OS&lt;/LI&gt;
&lt;LI&gt;CVE-2017-8390&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Customer-Advisories/FAQ-for-Palo-Alto-Networks-Security-Advisory-PAN-SA-2017-0021/ta-p/167549" target="_self"&gt;FAQ&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0020 - Cross-Site Scripting in PAN-OS&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Medium Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.11, PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;Affects the GlobalProtect external interface of PAN-OS&lt;/LI&gt;
&lt;LI&gt;CVE-2017-9467&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0019 - Cross-Site Scripting in the Management Web Interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Medium Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.11, PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;Affects the Management Interface of PAN-OS&lt;/LI&gt;
&lt;LI&gt;CVE-2017-9459&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Updated Security Advisories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0017 - OpenSSL Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;6.1.18 Fix available&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0018 - Kernel Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;6.1.18 Fix available&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Details of the issues, affected versions, and any mitigation information can be found in the Security Advisories.  &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please visit our Security Advisories website to learn more at &lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_self"&gt;https://securityadvisories.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;  If you have questions, please contact support &lt;A href="https://www.paloaltonetworks.com/company/contact-support  " target="_self"&gt;https://www.paloaltonetworks.com/company/contact-support  &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards &lt;/P&gt;
&lt;P&gt;Product Security Incident Response Team &lt;BR /&gt;Palo Alto Networks&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 20 Jul 2017 20:37:28 GMT</pubDate>
    <dc:creator>kshorrock</dc:creator>
    <dc:date>2017-07-20T20:37:28Z</dc:date>
    <item>
      <title>Palo Alto Networks Security Advisories [20-July-2017]</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-20-july-2017/ta-p/167560</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;P&gt;Palo Alto Networks has published 3 new and 2 updated Security Advisory addressing several security issue to &lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_self"&gt;https://securityadvisories.paloaltonetworks.com/&lt;/A&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Security Advisories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0021 - Vulnerability in the PAN-OS DNS Proxy&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Critical Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.10, PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;Affects DNS Proxy of PAN-OS&lt;/LI&gt;
&lt;LI&gt;CVE-2017-8390&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Customer-Advisories/FAQ-for-Palo-Alto-Networks-Security-Advisory-PAN-SA-2017-0021/ta-p/167549" target="_self"&gt;FAQ&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0020 - Cross-Site Scripting in PAN-OS&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Medium Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.11, PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;Affects the GlobalProtect external interface of PAN-OS&lt;/LI&gt;
&lt;LI&gt;CVE-2017-9467&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0019 - Cross-Site Scripting in the Management Web Interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Medium Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.11, PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;Affects the Management Interface of PAN-OS&lt;/LI&gt;
&lt;LI&gt;CVE-2017-9459&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Updated Security Advisories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0017 - OpenSSL Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;6.1.18 Fix available&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0018 - Kernel Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;6.1.18 Fix available&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Details of the issues, affected versions, and any mitigation information can be found in the Security Advisories.  &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please visit our Security Advisories website to learn more at &lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_self"&gt;https://securityadvisories.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;  If you have questions, please contact support &lt;A href="https://www.paloaltonetworks.com/company/contact-support  " target="_self"&gt;https://www.paloaltonetworks.com/company/contact-support  &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards &lt;/P&gt;
&lt;P&gt;Product Security Incident Response Team &lt;BR /&gt;Palo Alto Networks&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Jul 2017 20:37:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-20-july-2017/ta-p/167560</guid>
      <dc:creator>kshorrock</dc:creator>
      <dc:date>2017-07-20T20:37:28Z</dc:date>
    </item>
  </channel>
</rss>

