-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0015
           sol23332326: Apache HTTPD vulnerability CVE-2010-2791
                              5 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 BIG-IP LTM
                   F5 BIG-IP APM
                   F5 BIG-IP ASM
                   F5 BIG-IP Edge Gateway
                   F5 BIG-IP GTM
                   F5 BIG-IP Link Controller
                   F5 BIG-IP PSM
                   F5 BIG-IP WebAccelerator
                   F5 BIG-IP WOM
Publisher:         F5
Operating System:  Network Appliance
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2010-2791  

Reference:         ASB-2013.0057

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/23/sol23332326.html

- --------------------------BEGIN INCLUDED TEXT--------------------

sol23332326: Apache HTTPD vulnerability CVE-2010-2791 Security 
AdvisorySecurity Advisory

Original Publication Date: 12/29/2015

Vulnerability Description

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not
close the backend connection if a timeout occurs when reading a response from
a persistent connection, which allows remote attackers to obtain a potentially
sensitive response intended for a different client in opportunistic 
circumstances via a normal HTTP request. NOTE: this is the same issue as 
CVE-2010-2068, but for a different OS and set of affected versions. 
(CVE-2010-2791) 

Impact

This vulnerability can allow the unauthorized disclosure of information.

Note: The mod_proxy module is present, but not directly used in a way which 
exposes this issue to an unauthenticated attacker. There is control plane 
exposure; however, there is no data plane exposure. This vulnerability is 
rated as a medium risk for the impacted BIG-IP versions.

Security Issue Status

F5 Product Development has assigned IDs 377332 and 549279 to this 
vulnerability, and has evaluated the currently supported releases for 
potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product                                 Versions known to be vulnerable          Versions known to be not vulnerable           Severity            Vulnerable component or feature

BIG-IP LTM                              10.1.0 - 10.2.4                          12.0.0                                        Medium              httpd (Configuration utility, iControl)
                                                                                 11.0.0 - 11.6.0

BIG-IP AAM                              None                                     12.0.0                                        Not vulnerable      None
                                                                                 11.4.0 - 11.6.0

BIG-IP AFM                              None                                     12.0.0                                        Not vulnerable      None
                                                                                 11.3.0 - 11.6.0

BIG-IP Analytics                        None                                     12.0.0                                        Not vulnerable      None
                                                                                 11.0.0 - 11.6.0

BIG-IP APM                              10.1.0 - 10.2.4                          12.0.0                                        Medium              httpd (Configuration utility, iControl)
                                                                                 11.0.0 - 11.6.0

BIG-IP ASM                              10.1.0 - 10.2.4                          12.0.0                                        Medium              httpd (Configuration utility, iControl)
                                                                                 11.0.0 - 11.6.0

BIG-IP DNS                              None                                     12.0.0                                        Not vulnerable      None

BIG-IP Edge Gateway                     10.1.0 - 10.2.4                          11.0.0 - 11.3.0                               Medium              httpd (Configuration utility, iControl)

BIG-IP GTM                              10.1.0 - 10.2.4                          11.0.0 - 11.6.0                               Medium              httpd (Configuration utility, iControl)

BIG-IP Link Controller                  10.1.0 - 10.2.4                          12.0.0                                        Medium              httpd (Configuration utility, iControl)
                                                                                 11.0.0 - 11.6.0

BIG-IP PEM                              None                                     12.0.0                                        Not vulnerable      None
                                                                                 11.3.0 - 11.6.0

BIG-IP PSM                              10.1.0 - 10.2.4                          11.0.0 - 11.4.1                               Medium              httpd (Configuration utility, iControl)

BIG-IP WebAccelerator                   10.1.0 - 10.2.4                          11.0.0 - 11.3.0                               Medium              httpd (Configuration utility, iControl)

BIG-IP WOM                              10.1.0 - 10.2.4                          11.0.0 - 11.3.0                               Medium              httpd (Configuration utility, iControl)

ARX                                     None                                     6.0.0 - 6.4.0                                 Not vulnerable      None

Enterprise Manager                      None                                     3.0.0 - 3.1.1                                 Not vulnerable      None

FirePass                                None                                     7.0.0

6.0.0 - 6.1.0                           Not vulnerable                           None

BIG-IQ Cloud                            None                                     4.0.0 - 4.5.0                                 Not vulnerable      None

BIG-IQ Device                           None                                     4.2.0 - 4.5.0                                 Not vulnerable      None

BIG-IQ Security                         None                                     4.0.0 - 4.5.0                                 Not vulnerable      None

BIG-IQ ADC                              None                                     4.5.0                                         Not vulnerable      None

BIG-IQ Centralized Management           None                                     4.6.0                                         Not vulnerable      None

BIG-IQ Cloud and Orchestration          None                                     1.0.0                                         Not vulnerable      None

LineRate                                None                                     2.5.0 - 2.6.1                                 Not vulnerable      None

F5 WebSafe                              None                                     1.0.0                                         Not vulnerable      None

Traffix SDC                             None                                     4.0.0 - 4.4.0                                 Not vulnerable      None
                                                                                 3.3.2 - 3.5.1


Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values 
published in the previous table. The Severity values and other security 
vulnerability parameters are defined in SOL4602: Overview of the F5 security 
vulnerability response policy.

Supplemental Information

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents

SOL4918: Overview of the F5 critical issue hotfix policy

SOL167: Downloading software and firmware from F5

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=whit
-----END PGP SIGNATURE-----