-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1671
    sol15629: GNU Bash vulnerabilities CVE-2014-6271 and CVE-2014-7169
                             26 September 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 products
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-7169 CVE-2014-6271 

Reference:         ESB-2014.1670
                   ESB-2014.1669
                   ESB-2014.1668
                   ESB-2014.1660
                   ESB-2014.1659
                   ESB-2014.1657

Original Bulletin: 
   http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html

- --------------------------BEGIN INCLUDED TEXT--------------------

sol15629: GNU Bash vulnerabilities CVE-2014-6271 and CVE-2014-7169 

Security Advisory

Original Publication Date: 09/25/2014

Updated Date: 09/25/2014

Description

CVE-2014-6271

GNU Bash through 4.3 processes trailing strings after function definitions in
the values of environment variables, which allows remote attackers to execute
arbitrary code via a crafted environment, as demonstrated by vectors involving
the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in
the Apache HTTP Server, scripts executed by unspecified DHCP clients, and 
other situations in which setting the environment occurs across a privilege 
boundary from Bash execution.

CVE-2014-7169

GNU Bash through 4.3 bash43-025 processes trailing strings after certain 
malformed function definitions in the values of environment variables, which 
allows remote attackers to write to files or possibly have unknown other 
impact via a crafted environment, as demonstrated by vectors involving the 
ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the
Apache HTTP Server, scripts executed by unspecified DHCP clients, and other 
situations in which setting the environment occurs across a privilege boundary
from Bash execution. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2014-6271.

Impact

These vulnerabilities may allow authenticated users to gain knowledge of 
sensitive information, manipulate certain data, or remotely execute code.

Status

F5 Product Development has assigned ID 480931 (BIG-IP) and ID 481070 (ARX) to
this vulnerability, and has evaluated the currently supported releases for 
potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 	Versions known to 	Versions known to 	Vulnerable component 
		be vulnerable  		be not vulnerable	or feature

BIG-IP LTM 	11.0.0 - 11.6.0 
		10.0.0 - 10.2.4 	None			Bash shell 

BIG-IP AAM 	11.4.0 - 11.6.0 	None 			Bash shell

BIG-IP AFM 	11.3.0 - 11.6.0 	None 			Bash shell

BIG-IP 
Analytics 	11.0.0 - 11.6.0 	None 			Bash shell

BIG-IP APM 	11.0.0 - 11.6.0 
		10.1.0 - 10.2.4 	None		 	Bash shell

BIG-IP ASM 	11.0.0 - 11.6.0 
		10.0.0 - 10.2.4 	None 			Bash shell

BIG-IP Edge 
Gateway		11.0.0 - 11.3.0 
		10.1.0 - 10.2.4 	None 			Bash shell

BIG-IP GTM	11.0.0 - 11.6.0 
		10.0.0 - 10.2.4 	None 			Bash shell

BIG-IP Link 
Controller 	11.0.0 - 11.6.0 
		10.0.0 - 10.2.4 	None 			Bash shell

BIG-IP PEM 	11.3.0 - 11.6.0 	None 			Bash shell

BIG-IP PSM 	11.0.0 - 11.4.1 
		10.0.0 - 10.2.4 	None 			Bash shell

BIG-IP 
WebAccelerator 	11.0.0 - 11.3.0 
		10.0.0 - 10.2.4 	None 			Bash shell

BIG-IP WOM 	11.0.0 - 11.3.0 
		10.0.0 - 10.2.4 	None 			Bash shell

ARX 		6.0.0 - 6.4.0 		None 			Bash shell

Enterprise 
Manager 	** 			** 			**

FirePass 	None 			7.0.0 
					6.0.0 - 6.1.0 		None

BIG-IQ Cloud 	** 			** 			**

BIG-IQ Device 	** 			** 			**

BIG-IQ Security ** 			** 			**

LineRate 	None 			2.4.0 - 2.4.1 
					2.3.0 - 2.3.1 
					2.2.0 - 2.2.4 
					1.6.0 - 1.6.3 		None

**Confirmation of vulnerability or non-vulnerability is not presently 
available. F5 is still researching the issue for the products indicated, and 
will update this article as soon as the information has been confirmed.

Recommended action

If the previous table lists a version in the Versions known to be not 
vulnerable column, you can eliminate this vulnerability by upgrading to the 
listed version. If the table does not list any version in the column, then no
upgrade candidate currently exists.

To mitigate this vulnerability, you should permit access to the BIG-IP 
Configuration utility only over a secure network and limit login access to 
trusted users. For additional information, refer to the links in the following
Supplemental Information section.

Supplemental Information

    DevCentral: Shellshock mitigation with BIG-IP iRules

    Note: A DevCentral login is required to access this content.

    DevCentral: CVE-2014-6271 Shellshocked

    Note: A DevCentral login is required to access this content.

    DevCentral: Shellshock mitigation with LineRate Proxy

    Note: A DevCentral login is required to access this content.

    SOL9970: Subscribing to email notifications regarding F5 products

    SOL9957: Creating a custom RSS feed to view new and updated documents

    SOL4602: Overview of the F5 security vulnerability response policy

    SOL4918: Overview of the F5 critical issue hotfix policy

    SOL167: Downloading software and firmware from F5

    SOL13309: Restricting access to the Configuration utility by source IP 
    address (11.x)

    SOL7448: Restricting access to the Configuration utility by source IP 
    address (9.x - 10.x)

    SOL13092: Overview of securing access to the BIG-IP system

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qyu+
-----END PGP SIGNATURE-----