copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2016.0609 - [Appliance] F5 products: Multiple vulnerabilities

Date: 08 March 2016
References: ASB-2016.0004  ESB-2016.0551  ESB-2016.0552  ASB-2016.0018.2  ESB-2016.0569  ESB-2016.0574  ESB-2016.0585  ESB-2016.0591  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0609
              SOL81903701: Libpng vulnerability CVE-2015-8472
                               8 March 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 products
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Mitigation
CVE Names:         CVE-2015-8472 CVE-2015-8126 

Reference:         ASB-2016.0004
                   ESB-2016.0591
                   ESB-2016.0585
                   ESB-2016.0574
                   ESB-2016.0569
                   ESB-2016.0552
                   ESB-2016.0551
                   ASB-2016.0018.2

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/81/sol81903701.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SOL81903701: Libpng vulnerability CVE-2015-8472

Security Advisory

Original Publication Date: 03/07/2016

Vulnerability Description

Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x 
and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and
1.6.x before 1.6.20 allows remote attackers to cause a denial of service 
(application crash) or possibly have unspecified other impact via a small 
bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2015-8126. 
(CVE-2015-8472)

Impact

Allows unauthorized disclosure of information; Allows unauthorized 
modification; Allows disruption of service.

Important: A low severity rating applies when the attack is considered to be 
local only. A medium security rating applies when the APM module is enabled 
and configured with a Citrix VDI backend.

Security Issue Status

F5 Product Development has assigned ID 562159 (BIG-IP), 563839 (BIG-IQ) and 
563842 (Enterprise Manager) to this vulnerability, and has evaluated the 
currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 		Versions known to be vulnerable 	Versions known to be not vulnerable 	Severity 	Vulnerable component or feature

BIG-IP LTM 		12.0.0					None 					Low 		Local libpng library
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 			

BIG-IP AAM 		12.0.0					None 					Low 		Local libpng library
			11.4.0 - 11.6.0 

BIG-IP AFM 		12.0.0					None 					Low 		Local libpng library
			11.3.0 - 11.6.0 

BIG-IP Analytics 	12.0.0					None 					Low 		Local libpng library
			11.0.0 - 11.6.0 

BIG-IP APM 		12.0.0					None 					Medium* 	Local libpng library
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 

BIG-IP ASM 		12.0.0					None 					Low 		Local libpng library
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 

BIG-IP DNS 		12.0.0 					None 					Low 		Local libpng library

BIG-IP Edge Gateway 	None 					11.0.0 - 11.3.0				Not vulnerable 	None
								10.1.0 - 10.2.4 

BIG-IP GTM 		11.0.0 - 11.6.0				None 					Low 		Local libpng library
			10.1.0 - 10.2.4 

BIG-IP Link Controller 	12.0.0					None 					Low 		Local libpng library
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 

BIG-IP PEM 		12.0.0					None 					Low 		Local libpng library
			11.3.0 - 11.6.0 

BIG-IP PSM 		11.0.0 - 11.4.1				None 					Low 		Local libpng library
			10.1.0 - 10.2.4 

BIG-IP WebAccelerator 	11.0.0 - 11.3.0				None 					Low 		Local libpng library
			10.1.0 - 10.2.4 

BIG-IP WOM 		11.0.0 - 11.3.0				None 					Low 		Local libpng library
			10.1.0 - 10.2.4 		

ARX 			None 					6.0.0 - 6.4.0 				Not vulnerable 	None

Enterprise Manager 	3.0.0 - 3.1.1 				None 					Low 		Local libpng library

FirePass 		None 					7.0.0					Not vulnerable 	None
								6.0.0 - 6.1.0 

BIG-IQ Cloud 		4.0.0 - 4.5.0 				None 					Low 		Local libpng library

BIG-IQ Device 		4.2.0 - 4.5.0 				None 					Low 		Local libpng library

BIG-IQ Security 	4.0.0 - 4.5.0 				None 					Low 		Local libpng library

BIG-IQ ADC 		4.5.0 					None 					Low 		Local libpng library

BIG-IQ Centralized 
 Management 		4.6.0 					None 					Low 		Local libpng library

BIG-IQ Cloud and 
 Orchestration 		1.0.0 					None 					Low 		Local libpng library

LineRate 		None 					2.5.0 - 2.6.1 				Not vulnerable 	None

F5 WebSafe 		None 					1.0.0 					Not vulnerable 	None

Traffix SDC 		None 					4.0.0 - 4.4.0				Not vulnerable 	None
								3.3.2 - 3.5.1 

Vulnerability Recommended Actions

* BIG-IP APM 10.1.0 - 11.2.1 have a Low severity rating, due to the lack of 
VDI functionality. BIG-IP APM 11.3.0 and later may use the vulnerable 
functionality under specific deployment scenarios. For more information, refer
to the description in the Impact section of this article.

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values 
published in the previous table. The Severity values and other security 
vulnerability parameters are defined in SOL4602: Overview of the F5 security 
vulnerability response policy.

To mitigate this vulnerability for the BIG-IP APM system, ensure that remote 
Citrix resources are trusted.

Impact of action: Performing the recommended mitigation should not have a 
negative impact on your system.

Supplemental Information

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents

SOL4918: Overview of the F5 critical issue hotfix policy

SOL167: Downloading software and firmware from F5

SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

SOL10025: Managing BIG-IP product hotfixes (10.x)

SOL9502: BIG-IP hotfix matrix

SOL15106: Managing BIG-IQ product hotfixes

SOL15113: BIG-IQ hotfix matrix

SOL6664: Obtaining and installing OPSWAT hotfixes

SOL10942: Installing OPSWAT hotfixes on BIG-IP APM systems

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+0iO
-----END PGP SIGNATURE-----