-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1576
         MD5 Message-Digest Algorithm vulnerability CVE-2004-2761
                             12 September 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 ARX
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2004-2761  

Reference:         ESB-2010.1013
                   ESB-2009.0255
                   ESB-2009.0065

Original Bulletin: 
   http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15578.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SOL15578: MD5 Message-Digest Algorithm vulnerability CVE-2004-2761

Security AdvisorySecurity Advisory

Original Publication Date: 09/11/2014

Description

The MD5 Message-Digest Algorithm is not collision resistant, which makes it 
easier for context-dependent attackers to conduct spoofing attacks, as 
demonstrated by attacks on the use of MD5 in the signature algorithm of an 
X.509 certificate. (CVE-2004-2761)

Impact

A context-dependent attacker may be able to conduct spoofing attacks.

Status

F5 Product Development has assigned ID 477921 (ARX) to this vulnerability, and
has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 	Versions known to be vulnerable 	Versions known to be not vulnerable 	Vulnerable component or feature

BIG-IP LTM 	None					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4

BIG-IP AAM 	None 					11.4.0 - 11.6.0 			None

BIG-IP AFM 	None 					11.3.0 - 11.6.0 			None

BIG-IP 		None 					11.0.0 - 11.6.0				None
Analytics 

BIG-IP APM 	None 					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4 

BIG-IP ASM 	None 					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4

BIG-IP Edge 	None 					11.0.0 - 11.3.0				None
Gateway							10.1.0 - 10.2.4 


BIG-IP GTM 	None 					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4 

BIG-IP Link 	None					11.0.0 - 11.6.0				None
Controller 						10.1.0 - 10.2.4

BIG-IP PEM 	None					11.3.0 - 11.6.0				None

BIG-IP PSM 	None 					11.0.0 - 11.4.1				None
							10.1.0 - 10.2.4 

BIG-IP 		None 					11.0.0 - 11.3.0				None
WebAccelerator 						10.1.0 - 10.2.4 

BIG-IP WOM 	None 					11.0.0 - 11.3.0				None
							10.1.0 - 10.2.4

ARX 		6.0.0 - 6.4.0 				None 					ARX Manager GUI

Enterprise						3.0.0 - 3.1.1				None
Manager 						2.1.0 - 2.3.0

FirePass 	None 					7.0.0					None
							6.0.0 - 6.1.0 

BIG-IQ Cloud 	None					4.0.0 - 4.3.0				None

BIG-IQ Device	None					4.2.0 - 4.3.0				None

BIG-IQ Security None					4.0.0 - 4.3.0				None



Recommended Action

If the previous table lists a version in the Versions known to be not 
vulnerable column, you can eliminate this vulnerability by upgrading to the 
listed version. If the table does not list any version in the column, then no
upgrade candidate currently exists.

To mitigate this vulnerability, you can limit access for the ARX GUI to only 
use secure networks.

Supplemental Information

SOL12647: The device certificate is now generated using the SHA-1 hash 
algorithm

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents.

SOL4602: Overview of the F5 security vulnerability response policy

SOL4918: Overview of the F5 critical issue hotfix policy

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pTMT
-----END PGP SIGNATURE-----