Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.0163.2 sol02360853: NTP vulnerabilities CVE-2015-5194 and CVE-2015-5195 28 August 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: F5 BIG-IP F5 BIG-IQ F5 Traffix SDC F5 Enterprise Manager Publisher: F5 Operating System: Virtualisation Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-5195 CVE-2015-5194 Reference: ESB-2015.2733 Original Bulletin: https://support.f5.com/csp/article/K02360853 Revision History: August 28 2018: F5 patches released and Access vector adjusted January 25 2016: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- K02360853: NTP vulnerabilities CVE-2015-5194 and CVE-2015-5195 Security Advisory Original Publication Date: Jan 22, 2016 Updated Date: Aug 28, 2018 Applies to (see versions): o Product: BIG-IQ o 4.X.X o Product: BIG-IP o 13.0.0, 12.1.3, 12.1.2, 12.1.1, 12.1.0, 12.0.0, 11.6.3, 11.6.2, 11.6.1, 11.6.0, 11.5.7, 11.5.6, 11.5.5, 11.5.4, 11.5.3, 11.5.2, 11.5.1, 11.5.0, 11.4.1, 11.4.0, 11.3.0, 11.2.1, 11.2.0, 11.1.0, 11.0.0, 10.2.4, 10.2.3, 10.2.2, 10.2.1, 10.2.0, 10.1.0 o Product: F5 Silverline o 1.X.X o Product: Enterprise Manager o 3.X.X o Product: ARX, ARX o 6.4.0, 6.3.0, 6.2.0, 6.1.1, 6.1.0, 6.0.0 o Product: F5 MobileSafe o 1.X.X o Product: F5 WebSafe o 1.X.X o Product: Traffix SDC o 4.X.X, 3.X.X o Product: Legacy Products, FirePass, LineRate o 7.X.X, 6.1.X, 6.0.X, 2.X.X Security Advisory Description o CVE-2015-5194 The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands. o CVE-2015-5195 ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation. Impact The ntpd process could stop responding, due to an uninitialized variable, when processing malformed configuration commands. F5 has evaluated this vulnerability as having low impact to the BIG-IP product line for the following reasons: o This issue is not exposed in a BIG-IP system default configuration. o The configuration that exposes the issue is not recommended by F5. Security Advisory Status F5 Product Development has assigned IDs 568052 and 568054 (BIG-IP), ID 568165 (BIG-IQ), and ID 568170 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table. +---------------+----------------+-----------------+----------+----------------+ | |Versions known |Versions known to| |Vulnerable | |Product |to be vulnerable|be not vulnerable|Severity |component or | | | | | |feature | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0 - 12.1.1 |12.1.2 | | | |BIG-IP LTM |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | | |11.0.0 - 11.5.4 |11.6.1 HF2 | | | | |10.1.0 - 10.2.4 |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP AAM |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | | |11.4.0 - 11.5.4 |11.6.1 HF2 | | | | | |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP AFM |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | | |11.3.0 - 11.5.4 |11.6.1 HF2 | | | | | |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | |Analytics |11.0.0 - 11.5.4 |11.6.1 HF2 | | | | | |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP APM |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | | |11.0.0 - 11.5.4 |11.6.1 HF2 | | | | |10.1.0 - 10.2.4 |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP ASM |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | | |11.0.0 - 11.5.4 |11.6.1 HF2 | | | | |10.1.0 - 10.2.4 |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ |BIG-IP DNS |12.0.0- 12.1.1 |13.0.0 |Low |ntpd | | | |12.1.2 | | | +---------------+----------------+-----------------+----------+----------------+ |BIG-IP Edge |11.0.0 - 11.3.0 |None |Low |ntpd | |Gateway |10.1.0 - 10.2.4 | | | | +---------------+----------------+-----------------+----------+----------------+ | |11.6.0 - 11.6.1 |11.6.2 | | | |BIG-IP GTM |11.0.0 - 11.5.4 |11.6.1 HF2 |Low |ntpd | | |10.1.0 - 10.2.4 |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP Link |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | |Controller |11.0.0 - 11.5.4 |11.6.1 HF2 | | | | |10.1.0 - 10.2.4 |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ | | |13.0.0 | | | | |12.0.0- 12.1.1 |12.1.2 | | | |BIG-IP PEM |11.6.0 - 11.6.1 |11.6.2 |Low |ntpd | | |11.3.0 - 11.5.4 |11.6.1 HF2 | | | | | |11.5.5 | | | | | |11.5.4 HF3 | | | +---------------+----------------+-----------------+----------+----------------+ |BIG-IP PSM |11.0.0 - 11.4.1 |None |Low |ntpd | | |10.1.0 - 10.2.4 | | | | +---------------+----------------+-----------------+----------+----------------+ |BIG-IP |11.0.0 - 11.3.0 |None |Low |ntpd | |WebAccelerator |10.1.0 - 10.2.4 | | | | +---------------+----------------+-----------------+----------+----------------+ |BIG-IP WOM |11.0.0 - 11.3.0 |None |Low |ntpd | | |10.1.0 - 10.2.4 | | | | +---------------+----------------+-----------------+----------+----------------+ |ARX |None |6.0.0 - 6.4.0 |Not |None | | | | |vulnerable| | +---------------+----------------+-----------------+----------+----------------+ |Enterprise |3.0.0 - 3.1.1 |None |Low |ntpd | |Manager | | | | | +---------------+----------------+-----------------+----------+----------------+ |FirePass |None |7.0.0 |Not |None | | | |6.0.0 - 6.1.0 |vulnerable| | +---------------+----------------+-----------------+----------+----------------+ |BIG-IQ Cloud |4.0.0 - 4.5.0 |None |Low |ntpd | +---------------+----------------+-----------------+----------+----------------+ |BIG-IQ Device |4.2.0 - 4.5.0 |None |Low |ntpd | +---------------+----------------+-----------------+----------+----------------+ |BIG-IQ Security|4.0.0 - 4.5.0 |None |Low |ntpd | +---------------+----------------+-----------------+----------+----------------+ |BIG-IQ ADC |4.5.0 |None |Low |ntpd | +---------------+----------------+-----------------+----------+----------------+ |BIG-IQ | | | | | |Centralized |4.6.0 |None |Low |ntpd | |Management | | | | | +---------------+----------------+-----------------+----------+----------------+ |BIG-IQ Cloud | | | | | |and |1.0.0 |None |Low |ntpd | |Orchestration | | | | | +---------------+----------------+-----------------+----------+----------------+ |LineRate |None |2.5.0 - 2.6.1 |Not |None | | | | |vulnerable| | +---------------+----------------+-----------------+----------+----------------+ |F5 WebSafe |None |1.0.0 |Not |None | | | | |vulnerable| | +---------------+----------------+-----------------+----------+----------------+ |Traffix SDC |4.0.0 - 4.4.0 |None |Low |ntpd | | |3.3.2 - 3.5.1 | | | | +---------------+----------------+-----------------+----------+----------------+ Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation None - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW4SOfWaOgq3Tt24GAQi3BRAA1W0p6HzSuTGyzBhIbUx2SEacP22f6e2z pU8hdlUEyw4emqAkbwpLUxgWApWMBy1DUCicq0XRSUdUJzu5BQbiK6eFKaUIjEWj x4M8Fhmt3MXTdmwTp5vtLKc5RcIdRzOE4ppWCkloqphxse3o53cDWOKZK/zDTbLJ EgR/4DG5BJ0hLeCha7/hsw3gQEcBgWJ8fuA147Ke9wd3mI+fDg3kT5ZrUhnCzwun i1OexxzU9amC/HB3R+H50XxEw17yb8wmOjsptFHz6VjeqS3wSdNzKw9/laH6FxvZ 32clBtgIPMjnx0ABBsl+pqLARmwkYqQQsAdYvZLQn2Yjzea+2Q10oo7Skk98WEqL w/TVK1wtfvgho+/DGnElUKM18vxFg6GGLru6ZZw4hzYoOwLwLKJPxt+w3trk4GYC w7xPxCUmbd5MOY1Cz28WsopCeFTty2uGr+WR1tGSs74EImfCOcgieh4a8kY7gH3i VbO5eKY10KT9k5iTQUGYY2Ul388IGlzrIXAmPlGFl0NwE+yhERPXqp/cTiVaBRsw pTPfyME1SzUWFnVVTYX+Zz9T36g4BCVJC1qhz3DqoMbEsu8SAP44gn7dXc22EuVi 5EOjFyRmm6ydh42QPHzQvQqmXoFRz1cLxTiPdKCfWQTiqLNlH+o9cag4KN9hn2Ep hK3M0bYxd3o= =Tasc -----END PGP SIGNATURE-----