-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.3155
                SOL59010802: Multiple MySQL vulnerabilities
                             16 December 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 products
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
                   Unauthorised Access      -- Existing Account
Resolution:        Mitigation
CVE Names:         CVE-2015-4913 CVE-2015-4905 CVE-2015-4895
                   CVE-2015-4890 CVE-2015-4879 CVE-2015-4870
                   CVE-2015-4866 CVE-2015-4864 CVE-2015-4862
                   CVE-2015-4861 CVE-2015-4858 CVE-2015-4836
                   CVE-2015-4833 CVE-2015-4830 CVE-2015-4826
                   CVE-2015-4819 CVE-2015-4816 CVE-2015-4815
                   CVE-2015-4802 CVE-2015-4800 CVE-2015-4792
                   CVE-2015-4730  

Reference:         ASB-2015.0103
                   ESB-2015.3096
                   ESB-2015.3095
                   ESB-2015.2730
                   ESB-2015.2685
                   ESB-2015.2080.2

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/59/sol59010802.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SOL59010802: Multiple MySQL vulnerabilities

Security Advisory

Original Publication Date: 12/15/2015

Vulnerability Description

CVE-2015-4730

Unspecified vulnerability in Oracle MySQL 5.6.20 and earlier allows remote 
authenticated users to affect availability via unknown vectors related to 
Types.

CVE-2015-4792

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26
and earlier allows remote authenticated users to affect availability via 
unknown vectors related to Server : Partition, a different vulnerability than
CVE-2015-4802.

CVE-2015-4800

Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows 
remote authenticated users to affect availability via unknown vectors related
to Server : Optimizer.

CVE-2015-4802

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26
and earlier allows remote authenticated users to affect availability via 
unknown vectors related to Server : Partition, a different vulnerability than
CVE-2015-4792.

CVE-2015-4815

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26
and earlier allows remote authenticated users to affect availability via 
vectors related to Server : DDL.

CVE-2015-4816

Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows 
remote authenticated users to affect availability via unknown vectors related
to Server : InnoDB.

CVE-2015-4819

Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 
5.6.25 and earlier, allows local users to affect confidentiality, integrity, 
and availability via unknown vectors related to Client programs.

CVE-2015-4826

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26
and earlier allows remote authenticated users to affect confidentiality via 
unknown vectors related to Server : Types.

CVE-2015-4830

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26
and earlier allows remote authenticated users to affect integrity via unknown
vectors related to Server : Security : Privileges.

CVE-2015-4833

Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows 
remote authenticated users to affect availability via unknown vectors related
to Server : Partition.

CVE-2015-4836

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 
5.6.26 and earlier, allows remote authenticated users to affect availability 
via unknown vectors related to Server : SP.

CVE-2015-4858

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 
5.6.26 and earlier, allows remote authenticated users to affect availability 
via vectors related to DML, a different vulnerability than CVE-2015-4913.

CVE-2015-4861

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 
5.6.26 and earlier, allows remote authenticated users to affect availability 
via unknown vectors related to Server : InnoDB.

CVE-2015-4862

Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows 
remote authenticated users to affect availability via vectors related to DML.

CVE-2015-4864

Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24
and earlier allows remote authenticated users to affect integrity via unknown
vectors related to Server : Security : Privileges.

CVE-2015-4866

Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows 
remote authenticated users to affect availability via unknown vectors related
to Server : InnoDB.

CVE-2015-4870

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 
5.6.26 and earlier, allows remote authenticated users to affect availability 
via unknown vectors related to Server : Parser.

CVE-2015-4879

Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 
5.6.25 and earlier, allows remote authenticated users to affect 
confidentiality, integrity, and availability via vectors related to DML.

CVE-2015-4890

Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows 
remote authenticated users to affect availability via unknown vectors related
to Server : Replication.

CVE-2015-4895

Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows 
remote authenticated users to affect availability via unknown vectors related
to Server : InnoDB.

CVE-2015-4905

Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows 
remote authenticated users to affect availability via vectors related to 
Server : DML.

CVE-2015-4913

Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26
and earlier allows remote authenticated users to affect availability via 
vectors related to Server : DML, a different vulnerability than CVE-2015-4858.

Impact

The vulnerabilities included in this advisory are reported to allow a remote 
authenticated user to affect confidentiality, integrity, and the availability
of the MySQL service through undisclosed mechanisms. Exploitation of these 
vulnerabilities can potentially stop critical data plane services.

However, the BIG-IP system is not exposed to these vulnerabilities unless 
MySQL is provisioned or running. When BIG-IP Analytics (AVR), ASM, AFM, or APM
is provisioned, the system will enable MySQL to run and will then be exposed 
to these vulnerabilities. You can verify the status of MySQL by using the 
bigstart status mysql command.

Additionally, the BIG-IP and Enterprise Manager systems have default 
mitigations in place through local user authentication requirements and 
tcp_wrappers (BIG-IP 10.x), and iptables (BIG-IP 11.x / EM 3.x) that downgrade
the access vector for these vulnerabilities limited to local and authenticated
users.

Important: Enabling the Remote Access feature on Enterprise Manager systems 
will modify the iptables (3.x) rules to allow database access. As a result, 
the vulnerable access vector for these vulnerabilities is upgraded back to 
remote. The Enterprise Manager Remote Access feature is disabled by default; 
if you have enabled the Remote Access feature, refer to the Disabling the 
Remote Access feature procedure in the Vulnerability Recommended Actions 
section.

Security Issue Status

F5 Product Development has assigned ID 502493 (BIG-IP) and ID 556684 
(Enterprise Manager) to this vulnerability, and has evaluated the currently 
supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 		Versions known to  	Versions known to  	Severity 	Vulnerable component
			 be vulnerable		 be not vulnerable			 or feature

BIG-IP LTM 		12.0.0			None 			Medium 		MySQL
			11.0.0 - 11.6.0		
			10.1.0 - 10.2.4 	

BIG-IP AAM 		12.0.0			None 			Medium 		MySQL
			11.4.0 - 11.6.0 	

BIG-IP AFM 		12.0.0			None 			Medium 		MySQL
			11.3.0 - 11.6.0 	

BIG-IP Analytics 	12.0.0			None 			Medium 		MySQL
			11.0.0 - 11.6.0 	

BIG-IP APM 		12.0.0			None 			Medium 		MySQL
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 	

BIG-IP ASM 		12.0.0			None 			Medium 		MySQL
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 	

BIG-IP DNS 		12.0.0 			None 			Medium 		MySQL

BIG-IP Edge Gateway 	11.0.0 - 11.3.0		None 			Medium 		MySQL
			10.1.0 - 10.2.4 	

BIG-IP GTM 		11.0.0 - 11.6.0		None 			Medium 		MySQL
			10.1.0 - 10.2.4 	

BIG-IP Link Controller 	12.0.0			None 			Medium 		MySQL
			11.0.0 - 11.6.0
			10.1.0 - 10.2.4 	

BIG-IP PEM 		12.0.0			None 			Medium 		MySQL
			11.3.0 - 11.6.0 	

BIG-IP PSM 		11.0.0 - 11.4.1		None 			Medium 		MySQL
			10.1.0 - 10.2.4 	

BIG-IP WebAccelerator 	11.0.0 - 11.3.0		None 			Medium 		MySQL
			10.1.0 - 10.2.4 	

BIG-IP WOM 		11.0.0 - 11.3.0		None 			Medium 		MySQL
			10.1.0 - 10.2.4 	

ARX 			None 			6.0.0 - 6.4.0 		Not vulnerable 	None

Enterprise Manager 	3.0.0 - 3.1.1 		None 			Medium 		MySQL

FirePass 		None 			7.0.0
						6.0.0 - 6.1.0 		Not vulnerable 	None

BIG-IQ Cloud 		None 			4.0.0 - 4.5.0 		Not vulnerable 	None

BIG-IQ Device 		None 			4.2.0 - 4.5.0 		Not vulnerable 	None

BIG-IQ Security 	None 			4.0.0 - 4.5.0 		Not vulnerable 	None

BIG-IQ ADC 		None 			4.5.0 			Not vulnerable 	None

BIG-IQ Centralized 
Management 		None 			4.6.0 			Not vulnerable 	None

BIG-IQ Cloud and 
Orchestration 		None 			1.0.0 			Not vulnerable 	None

LineRate 		None 			2.5.0 - 2.6.1 		Not vulnerable 	None

F5 WebSafe 		None 			1.0.0 			Not vulnerable 	None

Traffix SDC 		None 			4.0.0 - 4.4.0
						3.3.2 - 3.5.1 		Not vulnerable 	None

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values 
published in the previous table. The Severity values and other security 
vulnerability parameters are defined in SOL4602: Overview of the F5 security 
vulnerability response policy.

To mitigate this vulnerability for BIG-IP and Enterprise Manager systems, you
should permit management access to F5 products only over a secure network and
limit shell access to only trusted users. For more information, refer to 
SOL13309: Restricting access to the Configuration utility by source IP address
(11.x - 12.x) and SOL13092: Overview of securing access to the BIG-IP system.

Additionally, for Enterprise Manager, you should avoid enabling the Remote 
Access feature to provide remote access to the statistical database. If you 
have the Remote Access feature enabled, you should disable it by performing 
the following procedure:

Disabling the Remote Access feature

Impact of action: You will no longer be allowed to remotely access the MySQL 
statistical database.

1. Log in to the Enterprise Manager Configuration utility.

2. Click Enterprise Management.

3. Navigate to Options > Statistics > Remote Access.

4. Clear the Allow Remote Access check box.

5. Click Save Changes.

Supplemental Information

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents

SOL4918: Overview of the F5 critical issue hotfix policy

SOL167: Downloading software and firmware from F5

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HSqa
-----END PGP SIGNATURE-----