-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0008
      Multiple NTP vulnerabilities may affect products by F5 networks
                              5 January 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 products
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Mitigation
CVE Names:         CVE-2014-9296 CVE-2014-9295 CVE-2014-9294
                   CVE-2014-9293  

Reference:         ASB-2014.0145
                   ESB-2015.0006
                   ESB-2014.2519
                   ESB-2014.2497
                   ESB-2014.2476
                   ESB-2014.2473
                   ESB-2014.2472

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15934.html
   https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15935.html
   https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15936.html
   https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15933.html

Comment: This bulletin contains four (4) F5 Networks security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

sol15934: NTP vulnerability CVE-2014-9293 

Security Advisory

Original Publication Date: 12/23/2014
Updated Date: 12/30/2014

Description

The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is
not configured, improperly generates a key, which makes it easier for remote
attackers to defeat cryptographic protection mechanisms via a brute-force 
attack. (CVE-2014-9293)

Impact

Default NTP configurations composed through the Configuration utility or the 
Traffic Management Shell (tmsh) are not vulnerable because auth or key values
are omitted on BIG-IP.

However, if the NTP configuration has been manually customized by modifying 
NTP configuration files to include the vulnerable values, such as auth, key,
or autokey options and there are no configured keys, the NTP daemon is 
vulnerable. A remote attacker may then be able to access private mode and 
control mode queries that require authentication. However, exploitation of this
vulnerability is considered highly unlikely because the attacker would also
need prior knowledge of the NTP destination and be able to guess the key. 
Additionally, this configuration would likely not work since matching keys are
a requirement for NTP auth to work.

Status

F5 Product Development has assigned ID 497717 (BIG-IP) to this vulnerability,
and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 	Versions known to be vulnerable 	Versions known to be not vulnerable 	Vulnerable component or feature
BIG-IP LTM 	11.0.0 - 11.6.0				None					NTP daemon
		10.1.0 - 10.2.4


BIG-IP AAM 	11.4.0 - 11.6.0				None 					NTP daemon

BIG-IP AFM 	11.3.0 - 11.6.0				None 					NTP daemon

BIG-IP  	11.0.0 - 11.6.0				None 					NTP daemon
Analytics	

BIG-IP APM 	11.0.0 - 11.6.0				None 					NTP daemon
		10.1.0 - 10.2.4

BIG-IP ASM 	11.0.0 - 11.6.0				None				 	NTP daemon
		10.1.0 - 10.2.4

BIG-IP 		11.0.0 - 11.3.0				None 					NTP daemon
Edge Gateway	10.1.0 - 10.2.4

BIG-IP GTM 	11.0.0 - 11.6.0				None 					NTP daemon
		10.1.0 - 10.2.4

BIG-IP  	11.0.0 - 11.6.0				None					NTP daemon
Link Controller	10.1.0 - 10.2.4

BIG-IP PEM 	11.3.0 - 11.6.0				None					NTP daemon

BIG-IP PSM 	11.0.0 - 11.4.1				None				 	NTP daemon
		10.1.0 - 10.2.4

BIG-IP  	11.0.0 - 11.3.0				None 					NTP daemon
WebAccelerator	10.1.0 - 10.2.4

BIG-IP WOM 	11.0.0 - 11.3.0				None				 	NTP daemon
		10.1.0 - 10.2.4

ARX 		** 					**				 	**

Enterprise  	** 					**				 	**
Manager

FirePass 	** 					**				 	**

BIG-IQ Cloud 	** 					** 					**

BIG-IQ Device 	** 					**				 	**

BIG-IQ Security ** 					**				 	**

LineRate 	**				 	** 					**

**Confirmation of vulnerability or non-vulnerability is not presently 
available. F5 is still researching the issue for the products indicated, and 
will update this article as soon as the information has been confirmed.

Recommended action

If the previous table lists a version in the Versions known to be not 
vulnerable column, you can eliminate this vulnerability by upgrading to the
listed version. If the listed version is older than the version you are 
currently running, or if the table does not list any version in the column,
then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined
in SOL4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability, you should only use the Configuration utility
or tmsh to configure NTP. Additionally, if a system has already been configured
with a vulnerable custom NTP configuration, you should remove the customizations. 

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products
    SOL9957: Creating a custom RSS feed to view new and updated documents.
    SOL4918: Overview of the F5 critical issue hotfix policy
    SOL167: Downloading software and firmware from F5
    SOL14120: Defining advanced NTP configurations on the BIG-IP system (11.x)
    SOL11237: Defining advanced NTP configurations on the BIG-IP system (9.x - 10.x)

- -------------------------------------------------------------------------------
sol15935: NTP vulnerability CVE-2014-9294 

Security Advisory

Original Publication Date: 12/23/2014
Updated Date: 12/30/2014

Description

util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, 
which makes it easier for remote attackers to defeat cryptographic protection
mechanisms via a brute-force attack. (CVE-2014-9294)

Impact

Theoretically, a remote attacker can determine a weak key and manipulate NTP 
packets. However, no public exploits are known at this time.

Status

F5 Product Development has assigned ID 497718 (BIG-IP) to this vulnerability,
and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 	Versions known to be vulnerable 	Versions known to be not vulnerable 	Vulnerable component or feature
BIG-IP LTM 	11.0.0 - 11.6.0*			None					ntp-keygen utility
		10.1.0 - 10.2.4*

BIG-IP AAM 	11.4.0 - 11.6.0*			None 					ntp-keygen utility

BIG-IP AFM 	11.3.0 - 11.6.0*			None 					ntp-keygen utility

BIG-IP  	11.0.0 - 11.6.0*			None				 	ntp-keygen utility
Analytics

BIG-IP APM 	11.0.0 - 11.6.0*			None 					ntp-keygen utility
		10.1.0 - 10.2.4*

BIG-IP ASM 	11.0.0 - 11.6.0*			None 					ntp-keygen utility
		10.1.0 - 10.2.4*

BIG-IP Edge 	11.0.0 - 11.3.0*			None 					ntp-keygen utility
Gateway		10.1.0 - 10.2.4*

BIG-IP GTM 	11.0.0 - 11.6.0*			None 					ntp-keygen utility
		10.1.0 - 10.2.4*

BIG-IP Link  	11.0.0 - 11.6.0*			None					ntp-keygen utility
Controller	10.1.0 - 10.2.4*

BIG-IP PEM 	11.3.0 - 11.6.0*			None					ntp-keygen utility

BIG-IP PSM 	11.0.0 - 11.4.1*			None 					ntp-keygen utility	
		10.1.0 - 10.2.4*

BIG-IP  	11.0.0 - 11.3.0*			None				 	ntp-keygen utility
WebAccelerator	10.1.0 - 10.2.4*

BIG-IP WOM 	11.0.0 - 11.3.0*			None 					ntp-keygen utility
		10.1.0 - 10.2.4*

ARX 		** 					** 					**

Enterprise  	** 					** 					**
Manager

FirePass 	** 					** 					**

BIG-IQ Cloud 	** 					** 					**

BIG-IQ Device 	** 					** 					**

BIG-IQ Security ** 					**				 	**

LineRate 	** 					**				 	**

*Affected version contains a vulnerable NTP package. However, the affected 
ntp-keygen utility is not used by default for NTP configurations. Only NTP
configurations that have been manually customized with keys generated with
the ntp-keygen utility are vulnerable.

**Confirmation of vulnerability or non-vulnerability is not presently 
available. F5 is still researching the issue for the products indicated, and
will update this article as soon as the information has been confirmed.

Recommended action

If the previous table lists a version in the Versions known to be not 
vulnerable column, you can eliminate this vulnerability by upgrading to the 
listed version. If the listed version is older than the version you are 
currently running, or if the table does not list any version in the column,
then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined 
in SOL4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability, you should only use the Configuration utility 
or the Traffic Management Shell (tmsh) to configure NTP. 

Alternatively, for systems with a customized NTP configuration that uses weak 
keys that were generated by a vulnerable ntp-keygen utility, you could replace
the weak keys with new keys generated on a system with a non-vulnerable version
of the ntp-keygen utility.

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products
    SOL9957: Creating a custom RSS feed to view new and updated documents.
    SOL4918: Overview of the F5 critical issue hotfix policy
    SOL167: Downloading software and firmware from F5

- -------------------------------------------------------------------------------

sol15936: NTP vulnerability CVE-2014-9295 

Security Advisory

Original Publication Date: 12/23/2014
Updated Date: 12/30/2014

Description

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote
attackers to execute arbitrary code via a crafted packet, related to (1) the 
crypto_recv function when the Autokey Authentication feature is used, (2) the
ctl_putdata function, and (3) the configure function. (CVE-2014-9295)

Impact

An attacker may be able to execute arbitrary code using a crafted NTP packet.

There are multiple parts to this NTP vulnerability:

(1) The crypoto_rec function is not used in a default NTP configuration. BIG-IP
is vulnerable only if Autokey Authentication is enabled through manual 
customizations to NTP configuration files.

(2) The ctl_putdata function impacts BIG-IP as a local-only vulnerability where
the attacker must already be on the system using shell. BIG-IP is vulnerable 
with a default NTP configuration.

(3) The configure() function is not found to be used by BIG-IP and the 
components needed for the vulnerability are not enabled. BIG-IP is not 
vulnerable to this part of the vulnerability.

Status

F5 Product Development has assigned ID 497719 (BIG-IP) to this vulnerability,
and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 	Versions known to be vulnerable 	Versions known to be not vulnerable 	Vulnerable component or feature
BIG-IP LTM 	11.0.0 - 11.6.0				None					NTP daemon of linux subsystem
		10.1.0 - 10.2.4


BIG-IP AAM 	11.4.0 - 11.6.0				None 					NTP daemon of linux subsystem

BIG-IP AFM 	11.3.0 - 11.6.0				None 					NTP daemon of linux subsystem

BIG-IP  	11.0.0 - 11.6.0				None 					NTP daemon of linux subsystem
Analytics

BIG-IP APM 	11.0.0 - 11.6.0				None 					NTP daemon of linux subsystem
		10.1.0 - 10.2.4

BIG-IP ASM 	11.0.0 - 11.6.0				None 					NTP daemon of linux subsystem
		10.1.0 - 10.2.4

BIG-IP Edge 	11.0.0 - 11.3.0				None 					NTP daemon of linux subsystem
Gateway		10.1.0 - 10.2.4


BIG-IP GTM 	11.0.0 - 11.6.0				None 					NTP daemon of linux subsystem
		10.1.0 - 10.2.4
	
BIG-IP Link  	11.0.0 - 11.6.0				None					NTP daemon of linux subsystem
Controller	10.1.0 - 10.2.4

BIG-IP PEM 	11.3.0 - 11.6.0				None					NTP daemon of linux subsystem

BIG-IP PSM 	11.0.0 - 11.4.1				None 					NTP daemon of linux subsystem
		10.1.0 - 10.2.4

BIG-IP  	11.0.0 - 11.3.0				None 					NTP daemon of linux subsystem
WebAccelerator	10.1.0 - 10.2.4

BIG-IP WOM 	11.0.0 - 11.3.0				None 					NTP daemon of linux subsystem
		10.1.0 - 10.2.4
	
ARX 		** 					** 					**

Enterprise  	** 					** 					**
Manager

FirePass 	** 					** 					**

BIG-IQ Cloud 	** 					** 					**

BIG-IQ Device 	** 					** 					**
		
BIG-IQ Security ** 					** 					**

LineRate 	** 					** 					**

**Confirmation of vulnerability or non-vulnerability is not presently 
available. F5 is still researching the issue for the products indicated, and 
will update this article as soon as the information has been confirmed.

Recommended action

If the previous table lists a version in the Versions known to be not 
vulnerable column, you can eliminate this vulnerability by upgrading to the
listed version. If the listed version is older than the version you are 
currently running, or if the table does not list any version in the column, 
then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined
in SOL4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability, you should only use the Configuration utility 
or the Traffic Management Shell (tmsh) to configure NTP. Additionally, you 
should only permit management access to F5 products over a secure network and
limit shell access to trusted users.

Additionally, if a system has already been configured with a vulnerable custom
NTP configuration, you should remove the customizations.

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products
    SOL9957: Creating a custom RSS feed to view new and updated documents.
    SOL4918: Overview of the F5 critical issue hotfix policy
    SOL167: Downloading software and firmware from F5

- -------------------------------------------------------------------------------

sol15933: NTP vulnerability CVE-2014-9296 

Security Advisory

Original Publication Date: 12/23/2014
Updated Date: 12/31/2014

The vulnerability described in this article has been resolved, or does not
affect any F5 products. There will be no further updates, unless new 
information is discovered.

Description

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to 
execute after detecting a certain authentication error, which might allow 
remote attackers to trigger an unintended association change via crafted 
packets. (CVE-2014-9296)

Impact

None. No F5 products are affected by this vulnerability. In currently supported
versions of BIG-IP, the receive() function is not vulnerable. In addition, the
crypto keyword is not used in the default configuration, so CVE-2014-9296 does
not apply.

Status

F5 Product Development has assigned ID 497723 (BIG-IP) to this vulnerability, 
and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following
table:

Product 	Versions known to be vulnerable 	Versions known to be not vulnerable 	Vulnerable component or feature
BIG-IP LTM 	None					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4

BIG-IP AAM 	None 					11.4.0 - 11.6.0			 	None

BIG-IP AFM 	None 					11.3.0 - 11.6.0				None

BIG-IP  	None 					11.0.0 - 11.6.0				None
Analytics

BIG-IP APM 	None 					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4

BIG-IP ASM 	None				 	11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4

BIG-IP Edge 	None 					11.0.0 - 11.3.0				None
Gateway							10.1.0 - 10.2.4

BIG-IP GTM 	None 					11.0.0 - 11.6.0				None
							10.1.0 - 10.2.4

BIG-IP Link  	None					11.0.0 - 11.6.0				None
Controller						10.1.0 - 10.2.4

BIG-IP PEM 	None					11.3.0 - 11.6.0				None

BIG-IP PSM 	None 					11.0.0 - 11.4.1				None
							10.1.0 - 10.2.4

BIG-IP  	None 					11.0.0 - 11.3.0				None
WebAccelerator						10.1.0 - 10.2.4

BIG-IP WOM 	None 					11.0.0 - 11.3.0				None
							10.1.0 - 10.2.4

ARX 		None 					6.0.0 - 6.4.0				None

Enterprise  	None 					3.0.0 - 3.1.1				None
Manager							2.1.0 - 2.3.0
	
FirePass 	None 					7.0.0					None
							6.0.0 - 6.1.0 	

BIG-IQ Cloud 	None 					4.0.0 - 4.4.0				None

BIG-IQ Device 	None 					4.2.0 - 4.4.0				None

BIG-IQ Security None 					4.0.0 - 4.4.0				None

LineRate 	None 					2.2.0 - 2.5.0				None
							1.6.0 - 1.6.4

Recommended action

If the previous table lists a version in the Versions known to be not 
vulnerable column, you can eliminate this vulnerability by upgrading to the 
listed version. If the listed version is older than the version you are 
currently running, or if the table does not list any version in the column, 
then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined 
in SOL4602: Overview of the F5 security vulnerability response policy.

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products
    SOL9957: Creating a custom RSS feed to view new and updated documents
    SOL4918: Overview of the F5 critical issue hotfix policy
    SOL167: Downloading software and firmware from F5

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=a5r3
-----END PGP SIGNATURE-----