Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2009.1071 f5 releases HotFixes for Multiple BIG-IP versions 2 September 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIG-IP 10.0.0 BIG-IP 9.4.7 BIG-IP 9.4.6 BIG-IP 9.4.5 Operating System: Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2009-0696 CVE-2009-0584 CVE-2009-0583 CVE-2009-0040 Member content until: Friday, October 2 2009 Reference: ASB-2009.1033 AA-2009.0107 OVERVIEW f5 have released a number of HotFixes for BIG-IP correcting a number of security vulnerabilities. IMPACT The vendor has provided the following information regarding these HotFixes and their associated vulnerabilities: libpng vulnerability CVE-2009-0040 "The PNG reference library (libpng), as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer." [1] icclib vulnerabilities CVE-2009-0583, and CVE-2009-0584 "Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript's International Color Consortium Format library (icclib). Using specially-crafted ICC profiles, an attacker could create a malicious PostScript or PDF file with embedded images which could cause Ghostscript to crash, or, potentially, execute arbitrary code when opened by the victim." [2] BIG-IP ASM and PSM remote buffer overflow exploit "The BIG-IP Application Security Manager (ASM) and Protocol Security Manager (PSM) bd daemon is vulnerable to a remote buffer overflow which may cause the system to crash and dump core." [3] BIND vulnerability CVE-2009-0696 "F5 Networks has determined BIG-IP GTM software is vulnerable to the malicious dynamic update message described in CVE-2009-0696. This vulnerability is mitigated by the fact that BIND will immediately restart after the crash. However, an attacker could sustain an outage by continuing to send malicious packets." [4] MITIGATION BIG-IP version 10.0.0 HF3 corrects the libpng, icclib and ASM/PSM buffer overflow vulnerabilities. BIG-IP version 9.4.7 HF2 corrects the BIND and ASM/PSM buffer overflow vulnerabilities. BIG-IP version 9.4.6 HF3 corrects the BIND and ASM/PSM buffer overflow vulnerabilities. BIG-IP version 9.4.5 HF3 corrects BIND vulnerability. These HotFixes are available for download from the vendor's website. [5] REFERENCES [1] SOL9988: libpng vulnerability CVE-2009-0040 https://support.f5.com/kb/en-us/solutions/public/9000/900/sol9988.html [2] SOL9990: icclib vulnerabilities CVE-2009-0583, and CVE-2009-0584 https://support.f5.com/kb/en-us/solutions/public/9000/900/sol9990.html [3] SOL10417: BIG-IP ASM and PSM remote buffer overflow exploit https://support.f5.com/kb/en-us/solutions/public/10000/400/sol10417.html [4] SOL10366: BIND vulnerability - CVE-2009-0696 https://support.f5.com/kb/en-us/solutions/public/10000/300/sol10366.html [5] F5 - Downloads https://downloads.f5.com/esd/productlines.jsp AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKnepXNVH5XJJInbgRAleEAJ4+puswHFDzxG5sfLgIBIxfxzLFSQCffUWT rJqxdBex2XnhOyxjF62vioA= =NwEF -----END PGP SIGNATURE-----