ESB-2018.3206.2 - UPDATE F5 Products: Unauthorised access - Remote/unauthenticated 2018-10-26

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.3206.2
              K52868493: libssh vulnerability CVE-2018-10933
                              26 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 Products
Publisher:         F5 Networks
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Mitigation
CVE Names:         CVE-2018-10933  

Reference:         ESB-2018.3198
                   ESB-2018.3171
                   ESB-2018.3135

Original Bulletin: 
   https://support.f5.com/csp/article/K52868493

Revision History:  October 26 2018: There is no impact. F5 products are not 
                                    vulnerable to CVE-2018-10933
                   October 22 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

K52868493: libssh vulnerability CVE-2018-10933

Security Advisory

Original Publication Date: Oct 19, 2018
Updated Date: Oct 26, 2018

Security Advisory Description

A vulnerability was found in libssh's server-side state machine before versions
0.7.6 and 0.8.4. A malicious client could create channels without first
performing authentication, resulting in unauthorized access. (CVE-2018-10933)

Impact

There is no impact. F5 products are not vulnerable to CVE-2018-10933.

Important:

- - There are security scanners that will report the BIG-IP system as vulnerable;
 this is due to "banner grabbing." This is a false positive.
- - There are log messages, which appear only in the sshplugin debug log, that
indicate a shell has been spawned. These messages are incorrect.
- - There is no security exposure of SSH virtual server pool members made
possible by this issue.

Security Advisory Status

F5 Product Development has evaluated the currently supported releases for
potential vulnerability, and no F5 products were found to be vulnerable.

Supplemental Information

  o K51812227: Understanding Security Advisory versioning
  o K41942608: Overview of Security Advisory articles
  o K4602: Overview of the F5 security vulnerability response policy
  o K9970: Subscribing to email notifications regarding F5 products
  o K9957: Creating a custom RSS feed to view new and updated documents

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW9K4c2aOgq3Tt24GAQheehAAqRt3ZyUpPmevcxHjkxzzWMP8VCyMAols
siilIzU0Eu+J1VfKKzQbO+NNuwGtP1EcEGWzUa4Dmgsjh5dwGJYLLwNtt+4fnW2O
fUt+ukajfgzlSUONy60ldoWXKYJJM5kN8uFT3CAKZF1cZFKp3gZuh29TqT0LDDQ6
Necvvc5xEkqPaoLX1Lzw08YorIjvYXw+KxsAJj82UizjsXgLNGihWvtojpMJQO9V
+PE+5Zr9oYuCU00mSL3NY4QKp8L8CFZRIYdnR0LMF6dbBuqw0yAG+DMsHs6YGcRJ
iJ+Zgp/W/D0ph5k00AYFsVR1N7N+UWKu4hQ5MCZGIVoo8faODQgLfFbACJodgUgB
Gzx+DRUNtfxAt/5tKBLkLD1paPjlIJHacKIU0yWmL843UFSlOcK028JiwbeI9SMM
uenc5aVzaHy7rWSAFJfiGnBlQ4jhlDyj2SAuqRlFbwkq36P+raeWXxCEme62lrJo
XAzv1Bk/kZlsmH3TuOMAgnvKBiAr5fpj2s865ho7ysWxj/5RWDBwp1dSjCB6e4Cl
6c3pcXVstqbMogmNdfzS80gdUlvZ8A6gid5iwZzzWRHT+4WgieXBd0PoRQ6yCoV7
jGKQJkqIea+hynjMbEo/iXMjtFzYLTrDBXEkMHCQfhR/cP1y/qopC+o+ffmpe3vX
4RrE5vkB/hs=
=cz20
-----END PGP SIGNATURE-----

« Back to bulletins