-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1043
          sol93532943: SSHD session.c vulnerability CVE-2016-3115
                               29 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 BIG-IP
                   F5 BIG-IQ
                   F5 Enterprise Manager
                   F5 Traffix SDC
Publisher:         F5 Networks
Operating System:  Network Appliance
                   Virtualisation
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-3115  

Reference:         ESB-2016.0670.2

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/93/sol93532943.html

- --------------------------BEGIN INCLUDED TEXT--------------------

sol93532943: SSHD session.c vulnerability CVE-2016-3115

Security Advisory

Original Publication Date: 04/27/2016

Vulnerability Description

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before
7.2p2 allow remote authenticated users to bypass intended shell-command 
restrictions via crafted X11 forwarding data, related to the (1) 
do_authenticated1 and (2) session_x11_req functions. (CVE-2016-3115)

Impact

Remote users may have the ability to read arbitrary files by using the 
authenticated user's privilege.

Security Issue Status

F5 Product Development has assigned ID 583678 (BIG-IP), ID 584222 (Enterprise
Manager), ID 584220 (BIG-IQ), INSTALLER-2306 (Traffix SDC), and LRS-60665 
(LineRate) to this vulnerability, and has evaluated the currently supported 
releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product                         Versions known to be vulnerable    Versions known to be not vulnerable    Severity        Vulnerable component or feature
BIG-IP LTM                      12.0.0                             None                                   Medium          OpenSSH *
                                11.0.0 - 11.6.0
				10.1.0 - 10.2.4
BIG-IP AAM                      12.0.0                             None                                   Medium          OpenSSH *
                                11.4.0 - 11.6.0
BIG-IP AFM                      12.0.0                             None                                   Medium          OpenSSH *
                                11.3.0 - 11.6.0
BIG-IP Analytics                12.0.0                             None                                   Medium          OpenSSH *
                                11.0.0 - 11.6.0
BIG-IP APM                      12.0.0                             None                                   Medium          OpenSSH *
                                11.0.0 - 11.6.0
				10.1.0 - 10.2.4
BIG-IP ASM                      12.0.0                             None                                   Medium          OpenSSH *
                                11.0.0 - 11.6.0
10.1.0 - 10.2.4
BIG-IP DNS                      12.0.0                             None                                   Medium          OpenSSH *
BIG-IP Edge Gateway             11.0.0 - 11.3.0                    None                                   Medium          OpenSSH *
                                10.1.0 - 10.2.4
BIG-IP GTM                      11.0.0 - 11.6.0                    None                                   Medium          OpenSSH *
                                10.1.0 - 10.2.4
BIG-IP Link Controller          12.0.0                             None                                   Medium          OpenSSH *
                                11.0.0 - 11.6.0
				10.1.0 - 10.2.4
BIG-IP PEM                      12.0.0                             None                                   Medium          OpenSSH *
                                11.3.0 - 11.6.0
BIG-IP PSM                      11.0.0 - 11.4.1                    None                                   Medium          OpenSSH *
                                10.1.0 - 10.2.4
BIG-IP WebAccelerator           11.0.0 - 11.3.0                    None                                   Medium          OpenSSH *
                                10.1.0 - 10.2.4
BIG-IP WOM                      11.0.0 - 11.3.0                    None                                   Medium          OpenSSH *
                                10.1.0 - 10.2.4
ARX                             None                               6.0.0 - 6.4.0                          Not vulnerable  None
Enterprise Manager              3.0.0 - 3.1.1                      None                                   Medium          OpenSSH *
FirePass                        None                               7.0.0                                  Not vulnerable  None
                                                                   6.0.0 - 6.1.0
BIG-IQ Cloud                    4.0.0 - 4.5.0                      None                                   Medium          OpenSSH *
BIG-IQ Device                   4.2.0 - 4.5.0                      None                                   Medium          OpenSSH *
BIG-IQ Security                 4.0.0 - 4.5.0                      None                                   Medium          OpenSSH *
BIG-IQ ADC                      4.5.0                              None                                   Medium          OpenSSH *
BIG-IQ Centralized Management   4.6.0                              None                                   Medium          OpenSSH *
BIG-IQ Cloud and Orchestration  1.0.0                              None                                   Medium          OpenSSH *
LineRate                        2.5.0 - 2.6.1                      None                                   Low             OpenSSH
F5 WebSafe                      None                               1.0.0                                  Not vulnerable  None
Traffix SDC                     4.0.0 - 4.4.0                      None                                   Low             OpenSSH
                                3.3.2 - 3.5.1

* The affected versions ship with vulnerable code, but do not enable the code
by default. The X11Forwarding option is not enabled unless explicitly enabled
by an administrator.

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values 
published in the previous table. The Severity values and other security 
vulnerability parameters are defined in SOL4602: Overview of the F5 security 
vulnerability response policy.

To mitigate this vulnerability, you can ensure that the X11Forwarding option 
is absent, commented out, or set to "no" in the sshd_config configuration 
file. Additionally you may restrict remote access to the sshd TCP port 22 to 
trusted networks only.

Impact of action: Performing the suggested mitigations should not have a 
negative impact on your system.

Supplemental Information

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents

SOL4918: Overview of the F5 critical issue hotfix policy

SOL167: Downloading software and firmware from F5

SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

SOL10025: Managing BIG-IP product hotfixes (10.x)

SOL9502: BIG-IP hotfix matrix

SOL15106: Managing BIG-IQ product hotfixes

SOL15113: BIG-IQ hotfix matrix

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=W6QO
-----END PGP SIGNATURE-----