Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1362 Multiple Oracle MySQL vulnerabilities 21 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIG-IP BIG-IQ Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Increased Privileges -- Unknown/Unspecified Denial of Service -- Existing Account Access Confidential Data -- Unknown/Unspecified Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2016-0616 CVE-2016-0609 CVE-2016-0608 CVE-2016-0606 CVE-2016-0600 CVE-2016-0598 CVE-2016-0597 CVE-2016-0596 CVE-2016-0546 CVE-2016-0505 CVE-2016-0502 Reference: ASB-2017.0219 ESB-2016.1807 ESB-2016.1333 Original Bulletin: https://support.f5.com/csp/article/K77508618 - --------------------------BEGIN INCLUDED TEXT-------------------- K77508618: Multiple Oracle MySQL vulnerabilities Original Publication Date: 06 May, 2017 Latest Publication Date: 20 Apr, 2021 Security Advisory Description o CVE-2016-0502 Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. o CVE-2016-0505 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options. o CVE-2016-0546 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name. o CVE-2016-0596 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML. o CVE-2016-0597 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. o CVE-2016-0598 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML. o CVE-2016-0600 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. o CVE-2016-0606 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption. o CVE-2016-0608 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF. o CVE-2016-0609 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges. o CVE-2016-0616 Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. Impact The CVE numbers included in this security advisory are reported to allow (through undisclosed mechanisms) an unauthorized remote attacker to gain access to information, receive privilege escalation, or cause a denial of service (DoS) of the MySQL service. Security Advisory Status F5 Product Development has assigned ID 577543 (BIG-IP) to this vulnerability. Additionally, BIG-IP iHealth may list Heuristic H77508618 on the Diagnostics > Identified > Low screen. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: +--------------+------------+--------------+----------+-----------------------+ | |Versions |Versions known| |Vulnerable component or| |Product |known to be |to be not |Severity |feature | | |vulnerable |vulnerable | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | | | | |12.0.0 - |14.0.0 and | |MySQL Client, MySQL | |BIG-IP LTM |12.1.6 |later |Low |Server, multiple MySQL | | |11.4.0 - | | |sub-components | | |11.6.5 | | | | | |11.2.1 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | |MySQL Client, MySQL | |BIG-IP AAM |12.0.0 - |14.0.0 and |Low |Server, multiple MySQL | | |12.1.6 |later | |sub-components | | |11.4.0 - | | | | | |11.6.5 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | |MySQL Client, MySQL | |BIG-IP AFM |12.0.0 - |14.0.0 and |Low |Server, multiple MySQL | | |12.1.6 |later | |sub-components | | |11.4.0 - | | | | | |11.6.5 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | | | |BIG-IP |12.0.0 - |14.0.0 and | |MySQL Client, MySQL | |Analytics |12.1.6 |later |Low |Server, multiple MySQL | | |11.4.0 - | | |sub-components | | |11.6.5 | | | | | |11.2.1 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | | | | |12.0.0 - |14.0.0 and | |MySQL Client, MySQL | |BIG-IP APM |12.1.6 |later |Low |Server, multiple MySQL | | |11.4.0 - | | |sub-components | | |11.6.5 | | | | | |11.2.1 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | | | | |12.0.0 - |14.0.0 and | |MySQL Client, MySQL | |BIG-IP ASM |12.1.6 |later |Low |Server, multiple MySQL | | |11.4.0 - | | |sub-components | | |11.6.5 | | | | | |11.2.1 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | |MySQL Client, MySQL | |BIG-IP DNS |13.1.4 |14.0.0 and |Low |Server, multiple MySQL | | |12.0.0 - |later | |sub-components | | |12.1.6 | | | | +--------------+------------+--------------+----------+-----------------------+ |BIG-IP Edge | | | |MySQL Client, MySQL | |Gateway |11.2.1 |None |Low |Server, multiple MySQL | | | | | |sub-components | +--------------+------------+--------------+----------+-----------------------+ | |11.4.0 - | | |MySQL Client, MySQL | |BIG-IP GTM |11.6.5 |None |Low |Server, multiple MySQL | | |11.2.1 | | |sub-components | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | | | |BIG-IP Link |12.0.0 - |14.0.0 and | |MySQL Client, MySQL | |Controller |12.1.6 |later |Low |Server, multiple MySQL | | |11.4.0 - | | |sub-components | | |11.6.5 | | | | | |11.2.1 | | | | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | |MySQL Client, MySQL | |BIG-IP PEM |12.0.0 - |14.0.0 and |Low |Server, multiple MySQL | | |12.1.6 |later | |sub-components | | |11.4.0 - | | | | | |11.6.5 | | | | +--------------+------------+--------------+----------+-----------------------+ | |11.4.0 - | | |MySQL Client, MySQL | |BIG-IP PSM |11.4.1 |None |Low |Server, multiple MySQL | | | | | |sub-components | +--------------+------------+--------------+----------+-----------------------+ |BIG-IP | | | |MySQL Client, MySQL | |WebAccelerator|11.2.1 |None |Low |Server, multiple MySQL | | | | | |sub-components | +--------------+------------+--------------+----------+-----------------------+ | |13.0.0 - | | | | | |13.1.4 | | |MySQL Client, MySQL | |BIG-IP WebSafe|12.0.0 - |14.0.0 and |Low |Server, multiple MySQL | | |12.1.6 |later | |sub-components | | |11.4.0 - | | | | | |11.6.5 | | | | +--------------+------------+--------------+----------+-----------------------+ |ARX |None |6.2.0 - 6.4.0 |Not |None | | | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |Enterprise |None |3.1.1 |Not |None | |Manager | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |BIG-IQ Cloud |None |4.4.0 - 4.5.0 |Not |None | | | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |BIG-IQ Device |None |4.4.0 - 4.5.0 |Not |None | | | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |BIG-IQ |None |4.4.0 - 4.5.0 |Not |None | |Security | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |BIG-IQ ADC |None |4.5.0 |Not |None | | | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |BIG-IQ | |5.0.0 - 5.2.0 |Not | | |Centralized |None |4.6.0 |vulnerable|None | |Management | | | | | +--------------+------------+--------------+----------+-----------------------+ |BIG-IQ Cloud | | |Not | | |and |None |1.0.0 |vulnerable|None | |Orchestration | | | | | +--------------+------------+--------------+----------+-----------------------+ |F5 iWorkflow |None |2.0.0 - 2.1.0 |Not |None | | | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |LineRate |None |2.5.0 - 2.6.2 |Not |None | | | | |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ |Traffix SDC |None |5.0.0 - 5.1.0 |Not |None | | | |4.0.0 - 4.4.0 |vulnerable| | +--------------+------------+--------------+----------+-----------------------+ Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation To partially mitigate this vulnerability, you can use an upstream device, such as a firewall, to restrict access to the MySQL socket. Impact of action: The impact of the suggested mitigation depends on the specific environment. F5 recommends testing any such changes during a maintenance window with consideration to the possible impact on your specific environment. Supplemental Information o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYH+hIeNLKJtyKPYoAQiHJQ/+O9ErkR0kWVj7R183MBbXhmLBKaT6k4RY 0GftXU+UX4QomaeFkYk+mDEjfauPFznSxct17VkKnWYjXQ7+yttKvm7LtNArtStI hpTbr9tLhu7XemidMo3+BGH2EekkN9T/J1AkrTRoKJiFiCpOy8IBPYhSl7EbUGuE KZxvo3jel3HlgPPomEBXLeWJKPAG2sJo3OUvqkQKbzeUbQwCZEWw4PWwE2okiu4q m74mr0Y3kTNqECwPQB8zp2NqxD1G2+OT8eQBzVwrOLczEgKmNohaamQd1AH1ocC7 Xcc+oKyAjmhcs6BUM5BSm4pfOeEt2BjgBBm7mVg3XJjNcm0D3zP8RuD0XRxEOcfA mQYonXMFVCM29BhLBfTJ/p8/f9xpM6kb7aO+++dhvOQA3CavRY2XOwTxKXSWT/fq j30wyjPSGF2ipDtVlMzgLbsQP97QPtqd+DN7iUyfJnUu/QyFF+K29fqFqlPk5Dl6 dVC6J7UQbz12yI9wVDFe4AhrUsGfY20L9E1TzwZ/p8EJRIbcLFLK6IoZE3IVyRMO TbQt6MhsemOEE3xqYcZ/mljq5SR+IKL2zxdiBFUDO/sXD/VkKPDYEkYgpKW4rql1 uwSftTU35VrSyaiXeNAtBFoxUIWys7VCUb1LovPIkWHSCOkkOA/Fdwpn+UbmqEEj dzCCrLKXKOs= =W38l -----END PGP SIGNATURE-----