-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2016.0163.2
     sol02360853: NTP vulnerabilities CVE-2015-5194 and CVE-2015-5195
                              28 August 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 BIG-IP
                   F5 BIG-IQ
                   F5 Traffix SDC
                   F5 Enterprise Manager
Publisher:         F5
Operating System:  Virtualisation
                   Network Appliance
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-5195 CVE-2015-5194 

Reference:         ESB-2015.2733

Original Bulletin: 
   https://support.f5.com/csp/article/K02360853

Revision History:  August  28 2018: F5 patches released and Access vector 
                                    adjusted
                   January 25 2016: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

K02360853: NTP vulnerabilities CVE-2015-5194 and CVE-2015-5195

Security Advisory

Original Publication Date: Jan 22, 2016
Updated Date: Aug 28, 2018

Applies to (see versions):

  o Product: BIG-IQ
      o 4.X.X
  o Product: BIG-IP
      o 13.0.0, 12.1.3, 12.1.2, 12.1.1, 12.1.0, 12.0.0, 11.6.3, 11.6.2, 11.6.1,
        11.6.0, 11.5.7, 11.5.6, 11.5.5, 11.5.4, 11.5.3, 11.5.2, 11.5.1, 11.5.0,
        11.4.1, 11.4.0, 11.3.0, 11.2.1, 11.2.0, 11.1.0, 11.0.0, 10.2.4, 10.2.3,
        10.2.2, 10.2.1, 10.2.0, 10.1.0
  o Product: F5 Silverline
      o 1.X.X
  o Product: Enterprise Manager
      o 3.X.X
  o Product: ARX, ARX
      o 6.4.0, 6.3.0, 6.2.0, 6.1.1, 6.1.0, 6.0.0
  o Product: F5 MobileSafe
      o 1.X.X
  o Product: F5 WebSafe
      o 1.X.X
  o Product: Traffix SDC
      o 4.X.X, 3.X.X
  o Product: Legacy Products, FirePass, LineRate
      o 7.X.X, 6.1.X, 6.0.X, 2.X.X

Security Advisory Description

  o CVE-2015-5194

    The log_config_command function in ntp_parser.y in ntpd in NTP before
    4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash)
    via crafted logconfig commands.

  o CVE-2015-5195

    ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to
    cause a denial of service (segmentation fault) via a crafted statistics or
    filegen configuration command that is not enabled during compilation.

Impact

The ntpd process could stop responding, due to an uninitialized variable, when
processing malformed configuration commands.

F5 has evaluated this vulnerability as having low impact to the BIG-IP product
line for the following reasons:

  o This issue is not exposed in a BIG-IP system default configuration.
  o The configuration that exposes the issue is not recommended by F5.

Security Advisory Status

F5 Product Development has assigned IDs 568052 and 568054 (BIG-IP), ID 568165
(BIG-IQ), and ID 568170 (Enterprise Manager) to this vulnerability, and has
evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or
features that are affected by the vulnerability, and for information about
releases or hotfixes that address the vulnerability, refer to the following
table.

+---------------+----------------+-----------------+----------+----------------+
|               |Versions known  |Versions known to|          |Vulnerable      |
|Product        |to be vulnerable|be not vulnerable|Severity  |component or    |
|               |                |                 |          |feature         |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0 - 12.1.1 |12.1.2           |          |                |
|BIG-IP LTM     |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|               |11.0.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |10.1.0 - 10.2.4 |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP AAM     |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|               |11.4.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |                |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP AFM     |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|               |11.3.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |                |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP         |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|Analytics      |11.0.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |                |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP APM     |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|               |11.0.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |10.1.0 - 10.2.4 |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP ASM     |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|               |11.0.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |10.1.0 - 10.2.4 |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IP DNS     |12.0.0- 12.1.1  |13.0.0           |Low       |ntpd            |
|               |                |12.1.2           |          |                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IP Edge    |11.0.0 - 11.3.0 |None             |Low       |ntpd            |
|Gateway        |10.1.0 - 10.2.4 |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |11.6.0 - 11.6.1 |11.6.2           |          |                |
|BIG-IP GTM     |11.0.0 - 11.5.4 |11.6.1 HF2       |Low       |ntpd            |
|               |10.1.0 - 10.2.4 |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP Link    |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|Controller     |11.0.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |10.1.0 - 10.2.4 |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|               |                |13.0.0           |          |                |
|               |12.0.0- 12.1.1  |12.1.2           |          |                |
|BIG-IP PEM     |11.6.0 - 11.6.1 |11.6.2           |Low       |ntpd            |
|               |11.3.0 - 11.5.4 |11.6.1 HF2       |          |                |
|               |                |11.5.5           |          |                |
|               |                |11.5.4 HF3       |          |                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IP PSM     |11.0.0 - 11.4.1 |None             |Low       |ntpd            |
|               |10.1.0 - 10.2.4 |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IP         |11.0.0 - 11.3.0 |None             |Low       |ntpd            |
|WebAccelerator |10.1.0 - 10.2.4 |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IP WOM     |11.0.0 - 11.3.0 |None             |Low       |ntpd            |
|               |10.1.0 - 10.2.4 |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|ARX            |None            |6.0.0 - 6.4.0    |Not       |None            |
|               |                |                 |vulnerable|                |
+---------------+----------------+-----------------+----------+----------------+
|Enterprise     |3.0.0 - 3.1.1   |None             |Low       |ntpd            |
|Manager        |                |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|FirePass       |None            |7.0.0            |Not       |None            |
|               |                |6.0.0 - 6.1.0    |vulnerable|                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IQ Cloud   |4.0.0 - 4.5.0   |None             |Low       |ntpd            |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IQ Device  |4.2.0 - 4.5.0   |None             |Low       |ntpd            |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IQ Security|4.0.0 - 4.5.0   |None             |Low       |ntpd            |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IQ ADC     |4.5.0           |None             |Low       |ntpd            |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IQ         |                |                 |          |                |
|Centralized    |4.6.0           |None             |Low       |ntpd            |
|Management     |                |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|BIG-IQ Cloud   |                |                 |          |                |
|and            |1.0.0           |None             |Low       |ntpd            |
|Orchestration  |                |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+
|LineRate       |None            |2.5.0 - 2.6.1    |Not       |None            |
|               |                |                 |vulnerable|                |
+---------------+----------------+-----------------+----------+----------------+
|F5 WebSafe     |None            |1.0.0            |Not       |None            |
|               |                |                 |vulnerable|                |
+---------------+----------------+-----------------+----------+----------------+
|Traffix SDC    |4.0.0 - 4.4.0   |None             |Low       |ntpd            |
|               |3.3.2 - 3.5.1   |                 |          |                |
+---------------+----------------+-----------------+----------+----------------+

Security Advisory Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a
non-vulnerable version, then no upgrade candidate currently exists.

Mitigation

None

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW4SOfWaOgq3Tt24GAQi3BRAA1W0p6HzSuTGyzBhIbUx2SEacP22f6e2z
pU8hdlUEyw4emqAkbwpLUxgWApWMBy1DUCicq0XRSUdUJzu5BQbiK6eFKaUIjEWj
x4M8Fhmt3MXTdmwTp5vtLKc5RcIdRzOE4ppWCkloqphxse3o53cDWOKZK/zDTbLJ
EgR/4DG5BJ0hLeCha7/hsw3gQEcBgWJ8fuA147Ke9wd3mI+fDg3kT5ZrUhnCzwun
i1OexxzU9amC/HB3R+H50XxEw17yb8wmOjsptFHz6VjeqS3wSdNzKw9/laH6FxvZ
32clBtgIPMjnx0ABBsl+pqLARmwkYqQQsAdYvZLQn2Yjzea+2Q10oo7Skk98WEqL
w/TVK1wtfvgho+/DGnElUKM18vxFg6GGLru6ZZw4hzYoOwLwLKJPxt+w3trk4GYC
w7xPxCUmbd5MOY1Cz28WsopCeFTty2uGr+WR1tGSs74EImfCOcgieh4a8kY7gH3i
VbO5eKY10KT9k5iTQUGYY2Ul388IGlzrIXAmPlGFl0NwE+yhERPXqp/cTiVaBRsw
pTPfyME1SzUWFnVVTYX+Zz9T36g4BCVJC1qhz3DqoMbEsu8SAP44gn7dXc22EuVi
5EOjFyRmm6ydh42QPHzQvQqmXoFRz1cLxTiPdKCfWQTiqLNlH+o9cag4KN9hn2Ep
hK3M0bYxd3o=
=Tasc
-----END PGP SIGNATURE-----