Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2012.0086.2 F5 SSH Configuration Vulnerability 22 June 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VIPRION BIG-IP Enterprise Manager Operating System: Network Appliance Impact/Access: Root Compromise -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2012-1493 Member content until: Saturday, July 14 2012 Revision History: June 22 2012: Corrected mitigation details June 14 2012: Initial Release OVERVIEW F5 has reported an SSH configuration vulnerability in some of its products. The vulnerability may allow a remote user to gain privileged access to affected systems using SSH. This vulnerability was reported to F5 by Florent Daigniere of Matta Consulting. [1] IMPACT On affected products, an unauthenticated user may gain root access to the device. F5 platforms affected by this issue include those from VIPRION, BIG-IP and Enterprise Manager range of products. Full details of affected and non-affected products are available from F5. [2] MITIGATION Users should either upgrade to a version that is not vulnerable, or for those not able to upgrade, F5 has provided options for SSH reconfiguration and mitigation by restricting access to the affected (SSH) service on the device. Complete information for addressing this vulnerability is available from F5. [2] REFERENCES [1] F5 BIG-IP remote root authentication bypass Vulnerability https://www.trustmatta.com/advisories/MATTA-2012-002.txt [2] SOL13600: SSH vulnerability CVE-2012-1493 http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBT+PRxe4yVqjM2NGpAQJHRxAAmFEvkAdeoRDEE/THTqkQQxdDCxjePSOe w2dbT6HOKp2sDTd1mkjw4IXX9A3bFJ5YKPFmp16wr8+MJCmNIjTRtpCcTE8tVgxT EA9bpVuopAPkczmwLWZJZ5HMrwulUIr2lgC2VmzBA4AF4hM/SrbP0QyapS7KPMC+ KqX5Buz1dzE96B1Vq+CLxof67nAcP91xWbvB/a0IRuCE5UVQrAoEyp2CW1X9yoY8 SlkxMHi9EC6WyiH2jA2yWG2BEGL8WgIInOxjhBZwk+bcAI3NoUL4OoglwwYEPT52 r6RyHoxKhsZtLVmYx8Us/2OH3s3wN0wUZA4FdiU4hcHuVFg9k8EoO6AuSiiA0aAA UujGk9dvtq/rjVqYvjHRd3fevF1IthnoF5yLgSdr+vwGX94RcrMdoCxZEHYWfFJA DQiGI9Gwcpx/go6ui3zQeqfrg7oFeoB/qZ3+jMMN/on7/uMVLIgqN5sTmi6E/l1I NAKJoYsnEzWJ3Qrm9Ts1bI1Wpp8s8rw16l15cmGIMYQSHH8r9/yeAXoAOGDytJTB Fk4pLjmJP3VWS8vzXlhWPMPvdVsQjb8pkjD78I3pnVrjNJO9Tj0nibwrn+wmU680 sVvzv2Scim+zQ5jxfm96pZGq90nRSxehC3R/fQjiyBDK5y/GlDqVxLWs510Vl2Lp trjc8vhqdCs= =DaDG -----END PGP SIGNATURE-----