Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.1400 SOL14733: Apache HTTP server vulnerability CVE-2013-1896 8 October 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ARX Publisher: F5 Operating System: Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Mitigation CVE Names: CVE-2013-1896 Reference: ESB-2013.1009 ESB-2013.1003 ESB-2013.0971 Original Bulletin: http://support.f5.com/kb/en-us/solutions/public/14000/700/sol14733.html - --------------------------BEGIN INCLUDED TEXT-------------------- SOL14733: Apache HTTP server vulnerability CVE-2013-1896 Security AdvisorySecurity Advisory Original Publication Date: 10/04/2013 Description mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. Impact Denial-of-service (DoS) for the ARX management API. Status F5 Product Development tracked this vulnerability as ID 431234 (ARX), and has evaluated the currently supported releases for potential vulnerability. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product Versions known Versions known Vulnerable component to be vulnerable to be not vulnerable or feature BIG-IP LTM None 11.0.0 - 11.4.1 None 10.0.0 - 10.2.4 BIG-IP AAM None 11.4.0 - 11.4.1 None BIG-IP AFM None 11.3.0 - 11.4.1 None BIG-IP None 11.0.0 - 11.4.1 None Analytics BIG-IP APM None 11.0.0 - 11.4.1 None 10.1.0 - 10.2.4 BIG-IP ASM None 11.0.0 - 11.4.1 None 10.0.0 - 10.2.4 BIG-IP Edge None 11.0.0 - 11.3.0 None Gateway 10.1.0 - 10.2.4 BIG-IP GTM None 11.0.0 - 11.4.1 None 10.0.0 - 10.2.4 BIG-IP Link None 11.0.0 - 11.4.1 None Controller 10.0.0 - 10.2.4 BIG-IP PEM None 11.3.0 - 11.4.1 None BIG-IP PSM None 11.0.0 - 11.4.1 None 10.0.0 - 10.2.4 BIG-IP None 11.0.0 - 11.3.0 None WebAccelerator 10.0.0 - 10.2.4 BIG-IP WOM None 11.0.0 - 11.3.0 None 10.0.0 - 10.2.4 ARX 6.0.0 - 6.4.0 None Management API 5.0.0 - 5.3.1 (disabled by default) Enterprise None 3.0.0 - 3.1.1 None Manager 2.0.0 - 2.3.0 FirePass None 7.0.0 None 6.0.0 - 6.1.0 BIG-IQ Cloud None 4.0.0 - 4.1.0 None BIG-IQ Security None 4.0.0 - 4.1.0 None Recommended action To mitigate this vulnerability for ARX, do not enable the API functionality. Supplemental Information Common Vulnerabilities and Exposures (CVE-2013-1896) Note: This link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. SOL9970: Subscribing to email notifications regarding F5 products SOL9957: Creating a custom RSS feed to view new and updated documents SOL4602: Overview of the F5 security vulnerability response policy SOL4918: Overview of the F5 critical issue hotfix policy - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUlNVsBLndAQH1ShLAQJBNxAAlBrXqSmd4+7XvO162qL0jKL11+0ajvYz nVJDomBtOCA0Hi7dLX8BWRmJz863nbFCxdIML9UHW21xbBSlMtjpuQCIZa+J4G4r 5IiOr8vMHJrMyd/2CaeTQIyJKyaGyKtqJhcOQUUpfeEmF4ad0yZsB+UOMp+/saRV U/Hv4Ra95iATEbgGN1Y9RFZgPZgpMavMei4qmrQ7S3a+xy4bOCoIbTYJRUg6BFPH dHbBHS9/8GXg97oBzJRfz6d1MNXQbShc4vhbO/gphoIUn4aLrgEHeAORcCVVByW9 C4lsWoRgRcvZAw0g9RSNcBLBA1uudAOhkykDoSArv68E2SuvrruszI/1rM6OTpSl XSSjxg8YzwWyhpJCsjT5RdYprQ7qht+I3ldT/IyjwRXGnn5fEZoDe8Zqlt9zkv5P qVrdoaV1vGvyudxbL1St74Xe0zt4EkXjD9J30ZNP5mbh6Jv8wUK6DeAKvTgAwYB5 ylwgAISSIcA0JZ6MHdFqc955Lka1/9atl+laqWclg3422hJBCoV0wkm2KJWHMk5J E4NvlaU9e1TutFV3eVuzqTjNj6Yibn0a5Ss7htb4XPZlT4RPayl6Sdhh4y+D71+Y PIx4lP8euVjPjdkArfdfZ3Q5SVpGOUVtQfeDg5cOQLS5ADftTkqUvWxSSjLcnb6C UkJK+I0JnD0= =I2Kd -----END PGP SIGNATURE-----