copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ASB-2012.0002 - [Appliance] F5 Enterprise Manager prior to 2.3.0: Multiple vulnerabilities

Date: 04 January 2012
References: AU-2008.0026  ESB-2010.0451  ESB-2010.0506  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0002
               F5 Enterprise Manager version 2.3.0 released
                              4 January 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              F5 Enterprise Manager prior to 2.3.0
Operating System:     Network Appliance
Impact/Access:        Execute Arbitrary Code/Commands -- Existing Account
                      Create Arbitrary Files          -- Existing Account
                      Delete Arbitrary Files          -- Existing Account
                      Denial of Service               -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2010-1447 CVE-2010-1321 CVE-2010-1168
                      CVE-2008-5303 CVE-2008-5302 
Member content until: Friday, February  3 2012
Reference:            ESB-2010.0451
                      AU-2008.0026
                      ESB-2010.0506

OVERVIEW

        F5 have released Enterprise Manager version 2.3.0 correcting multiple
        security vulnerabilities.


IMPACT

        The vendor has provided the following information regarding the
        security vulnerabilities that have been corrected:
        
        ID 336949 "The kerberos package included with Enterprise Manager is affected
        by the vulnerabilities described in CVE-2010-1321 and VU#233500." [1]
        
        ID 336952 "The perl package included with Enterprise Manager is affected by
        the vulnerabilities described in CVE-2008-5302, CVE-2008-5303,
        CVE-2010-1168, and CVE-2010-1447." [1]


MITIGATION

        Enterprise Manager 2.3.0 addresses these vulnerabilities. For detailed
        instruction on upgrading to this version, please see the vendor's
        bulletin. [1]


REFERENCES

        [1] Release Note: Enterprise Manager version 2.3.0
            http://support.f5.com/kb/en-us/products/em/releasenotes/product/relnote-em-2-3-0.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBTwPvgu4yVqjM2NGpAQKLqQ//f+a5RBAubNENMbLqOuRC0jqe3G9ZBzdz
jlfl80v/yQ1j6ebpu34G8vKSgNZlUzG+i0pfihGJGmwa7M9vZrFbIiBTBWkh/wxc
fGeBoJdPYeFO3ctpuse8m4Cd3dXrJtF0yqNz7XmHySshCtAToq5ikVgZEoKWrQOK
WrFJI+DwjePujHHsUGWFOrK9NVHP800omwb0nArGUfZzMCtbDZS5eCN2pkbRdGen
s5m4JJDzECU5def9pSNVYp3Lprw9W1s7zQ1kDH3J1+1LZdBospSJTOZ8LTSta+CM
cYXJpRGrQX79eOl+xfgrbnI31k6lqH9mXd13XlifN+/w3t7Yuli7B92lOtGAi3Tj
yhQhKQsUoAeHWUN3L3L8y/N5oHmFe1+EO30YRDekbMzzg72IW1KrY9i2o7bLnBuV
YOh8WKpp5tXj9wziMt4mLmQjELBo+bqibVgEF8xqBK61Syprv516t9ErNydbzv2g
cvTDIksLGngf9tfxhMl0F9ss/G2deRjGb5tNxM1ShGd9+O6I1AjOQx9LUTTojHiI
kc6rr0/bow6sSBx+Dtz9ShtYA4DLRLvJpOXyLlSdeCj3WhkrNndLPvFVzDayXXX7
1AnLi+8H04VxmrmDIV17Qdft/bPUa9wJ4rJoYmqrqxjANirIowy/qXx5fP1ExBJS
hMY1ZzqeThg=
=2Sec
-----END PGP SIGNATURE-----