<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Palo Alto Networks Security Advisories [27-July-2017] in PSIRT Articles</title>
    <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-27-july-2017/ta-p/168717</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;P&gt;Palo Alto Networks has published 1 new Security Advisory addressing 1 security issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Security Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0022 - NTP Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Network Time Protocol (NTP) library has been found to contain a&amp;nbsp;vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Low Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 8.0.4&lt;/LI&gt;
&lt;LI&gt;Fixes for 6.1, 7.0 and 7.1 will be released on a future date&lt;/LI&gt;
&lt;LI&gt;CVE-2017-6460&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Details of the issues, affected versions, and any mitigation information can be found in the Security Advisory.  &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please visit our Security Advisories website to learn more at &lt;A href="https://securityadvisories.paloaltonetworks.com/  " target="_self"&gt;https://securityadvisories.paloaltonetworks.com/  &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have questions, please contact support &lt;A href="https://www.paloaltonetworks.com/company/contact-support" target="_self"&gt;https://www.paloaltonetworks.com/company/contact-support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;  Regards &lt;/P&gt;
&lt;P&gt;Product Security Incident Response Team&lt;BR /&gt;Palo Alto Networks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Updated August-07-2017&lt;/STRONG&gt; - This advisory initially listed&lt;SPAN&gt;&amp;nbsp;CVE-2016-9042. This was incorrect and PAN-OS is not&amp;nbsp;affected by CVE-2016-9042. The security advisory has been updated to reflect&amp;nbsp;this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 07 Aug 2017 16:05:25 GMT</pubDate>
    <dc:creator>kshorrock</dc:creator>
    <dc:date>2017-08-07T16:05:25Z</dc:date>
    <item>
      <title>Palo Alto Networks Security Advisories [27-July-2017]</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-27-july-2017/ta-p/168717</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;P&gt;Palo Alto Networks has published 1 new Security Advisory addressing 1 security issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Security Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0022 - NTP Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Network Time Protocol (NTP) library has been found to contain a&amp;nbsp;vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Low Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 8.0.4&lt;/LI&gt;
&lt;LI&gt;Fixes for 6.1, 7.0 and 7.1 will be released on a future date&lt;/LI&gt;
&lt;LI&gt;CVE-2017-6460&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Details of the issues, affected versions, and any mitigation information can be found in the Security Advisory.  &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please visit our Security Advisories website to learn more at &lt;A href="https://securityadvisories.paloaltonetworks.com/  " target="_self"&gt;https://securityadvisories.paloaltonetworks.com/  &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have questions, please contact support &lt;A href="https://www.paloaltonetworks.com/company/contact-support" target="_self"&gt;https://www.paloaltonetworks.com/company/contact-support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;  Regards &lt;/P&gt;
&lt;P&gt;Product Security Incident Response Team&lt;BR /&gt;Palo Alto Networks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Updated August-07-2017&lt;/STRONG&gt; - This advisory initially listed&lt;SPAN&gt;&amp;nbsp;CVE-2016-9042. This was incorrect and PAN-OS is not&amp;nbsp;affected by CVE-2016-9042. The security advisory has been updated to reflect&amp;nbsp;this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 07 Aug 2017 16:05:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-27-july-2017/ta-p/168717</guid>
      <dc:creator>kshorrock</dc:creator>
      <dc:date>2017-08-07T16:05:25Z</dc:date>
    </item>
  </channel>
</rss>

