-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2012.0086.2
                    F5 SSH Configuration Vulnerability
                               22 June 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              VIPRION
                      BIG-IP
                      Enterprise Manager
Operating System:     Network Appliance
Impact/Access:        Root Compromise -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2012-1493  
Member content until: Saturday, July 14 2012

Revision History:     June 22 2012: Corrected mitigation details
                      June 14 2012: Initial Release

OVERVIEW

        F5 has reported an SSH configuration vulnerability in some of its 
        products. The vulnerability may allow a remote user to gain privileged
        access to affected systems using SSH.
        
        This vulnerability was reported to F5 by Florent Daigniere of Matta 
        Consulting. [1]


IMPACT

        On affected products, an unauthenticated user may gain root access 
        to the device. 
        
        F5 platforms affected by this issue include those from VIPRION,
        BIG-IP and Enterprise Manager range of products. Full details of 
        affected and non-affected products are available from F5. [2]


MITIGATION

        Users should either upgrade to a version that is not vulnerable, or for
        those not able to upgrade, F5 has provided options for SSH
        reconfiguration and mitigation by restricting access to the affected
        (SSH) service on the device. Complete information for addressing 
        this vulnerability is available from F5. [2]


REFERENCES

        [1] F5 BIG-IP remote root authentication bypass Vulnerability
            https://www.trustmatta.com/advisories/MATTA-2012-002.txt

        [2] SOL13600: SSH vulnerability CVE-2012-1493
            http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=DaDG
-----END PGP SIGNATURE-----