Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1760 SOL16841: GNU C Library (glibc) vulnerability CVE-2013-7423 3 July 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: F5 products Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Access Confidential Data -- Existing Account Resolution: Mitigation CVE Names: CVE-2013-7423 Reference: ESB-2015.1725 ESB-2015.1704 ESB-2015.1362 ESB-2015.1230 ESB-2015.1099 Original Bulletin: https://support.f5.com/kb/en-us/solutions/public/16000/800/sol16841.html - --------------------------BEGIN INCLUDED TEXT-------------------- SOL16841: GNU C Library (glibc) vulnerability CVE-2013-7423 Security Advisory Original Publication Date: 07/02/2015 Description The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of request that trigger a call to the getaddrinfo function. (CVE-2013-7423) Impact This vulnerability can only be exploited in F5 products by locally authenticated users. An attacker may be able to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. No remote vulnerabilities are known. Status F5 Product Development has assigned ID 520153 (BIG-IP), ID 522207 (BIG-IQ), and ID 522209 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product Versions known to Versions known to Severity Vulnerable component be vulnerable be not vulnerable or feature BIG-IP LTM 11.0.0 - 11.6.0 10.1.0 - 10.2.4 None Low glibc BIG-IP AAM 11.4.0 - 11.6.0 None Low glibc BIG-IP AFM 11.3.0 - 11.6.0 None Low glibc BIG-IP Analytics 11.0.0 - 11.6.0 None Low glibc BIG-IP APM 11.0.0 - 11.6.0 10.1.0 - 10.2.4 None Low glibc BIG-IP ASM 11.0.0 - 11.6.0 10.1.0 - 10.2.4 None Low glibc BIG-IP Edge Gateway 11.0.0 - 11.3.0 10.1.0 - 10.2.4 None Low glibc BIG-IP GTM 11.0.0 - 11.6.0 10.1.0 - 10.2.4 None Low glibc BIG-IP Link Controller 11.0.0 - 11.6.0 10.1.0 - 10.2.4 None Low glibc BIG-IP PEM 11.3.0 - 11.6.0 None Low glibc BIG-IP PSM 11.0.0 - 11.4.1 10.1.0 - 10.2.4 None Low glibc BIG-IP WebAccelerator 11.0.0 - 11.3.0 10.1.0 - 10.2.4 None Low glibc BIG-IP WOM 11.0.0 - 11.3.0 10.1.0 - 10.2.4 None Low glibc ARX None 6.0.0 - 6.4.0 Not vulnerable None Enterprise Manager 3.0.0 - 3.1.1 2.1.0 - 2.3.0 None Low glibc FirePass None 7.0.0 6.0.0 - 6.1.0 Not vulnerable None BIG-IQ Cloud 4.0.0 - 4.5.0 None Low glibc BIG-IQ Device 4.2.0 - 4.5.0 None Low glibc BIG-IQ Security 4.0.0 - 4.5.0 None Low glibc BIG-IQ ADC 4.5.0 None Low glibc LineRate None 2.5.0 - 2.6.0 Not vulnerable None F5 WebSafe None 1.0.0 Not vulnerable None Traffix SDC None 4.0.0 - 4.4.0 3.3.2 - 3.5.1 Not vulnerable None Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value. Recommended Action If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists. F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in SOL4602: Overview of the F5 security vulnerability response policy. You should permit access to F5 products only over a secure network and limit login access to trusted users. For more information, refer to SOL13092: Overview of securing access to the BIG-IP system. Supplemental Information SOL9970: Subscribing to email notifications regarding F5 products SOL9957: Creating a custom RSS feed to view new and updated documents SOL4602: Overview of the F5 security vulnerability response policy SOL4918: Overview of the F5 critical issue hotfix policy - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVZXd8H6ZAP0PgtI9AQKFgRAAwlfHGkyF50rzWClcYsyhDgZsTX5zfGIr S3HQ8AurC21YCcP3pToP4h9QTSs42YdNlZ2pizfF5IcANaW4NE+nsDBCkXal2Bm2 9zjBzK1P5td/eImjXXOr+IREMKXwgujZIgohdkwouGrkeTBZTFKAq25Q38d+asF9 cbaNZLDOU9Xm3Zv4lZbjTuAOhJEkxPd2oQJSZOLCbgmaRYu3zaNm/zAoc+KzLGCQ oWXSaVR3MPQtqV2h4/XCJMNprLsnsb5FI6zCQd61p1MDcHVC8LO3gghEvQcThXOc Skel5Q9uDfH3jjae6xQ7WtJDtsNs66BDL0ztrfamuRSnPZBHeTY0MRZ7L/QA/xhE r8yzgW/v3mNGQGSmxZFAzQQbFVLImAYEaDCHZk18B2lZWnRPQVJuuwzAI4zf2f+v cnQxJQn4MI/MlhKSAWL/yVVseV3BEpN0Qt38SltdcCNTERYjDus/4zXWgRUzVD81 SWgoQToQNKA1r97LiM3WmQK0CHzJBparMCQjxcg73Cfh0Iqlas/+8tAkJhcEiACb cagd+5S8AJG9wXKsdq2RbbDlqIteCvVe8AaD6BrEiYoRlVK/KOOaRk9Iq50+sQ3U 5IFy44XhZ0Dnatr43indGyoT7lIh3mp/wboc+F9v/9Te9O/v6Ycw3b4bS47O74Rg l6qzKFHb8Lk= =+QNG -----END PGP SIGNATURE-----