-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1306
               SOL35240323: PHP Vulnerability CVE-2016-4539
                                24 May 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 BIG-IP products
                   F5 Enterprise Manager
                   F5 BIG-IQ products
Publisher:         F5 Networks
Operating System:  Network Appliance
                   Virtualisation
Impact/Access:     Denial of Service -- Remote/Unauthenticated
                   Reduced Security  -- Remote/Unauthenticated
Resolution:        Mitigation
CVE Names:         CVE-2016-4539  

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/35/sol35240323.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SOL35240323: PHP Vulnerability CVE-2016-4539

Security Advisory

Original Publication Date: 05/23/2016

Vulnerability Description

The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 
5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a 
denial of service (buffer under-read and segmentation fault) or possibly have
unspecified other impact via crafted XML data in the second argument, leading
to a parser level of zero. (CVE-2016-4539)

Impact

In default configurations, F5 products are not vulnerable. Versions listed as
vulnerable include vulnerable code, but the code is not used in standard 
configurations.

Security Issue Status

F5 Product Development has assigned ID 594496 (BIG-IP) and ID 594590 (EM and 
BIG-IQ) to this vulnerability, and has evaluated the currently supported 
releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 		Versions known to be vulnerable 	Versions known to be not vulnerable 	Severity 	Vulnerable component or feature

BIG-IP LTM 		12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.0.0 - 11.6.1
			10.1.0 - 10.2.4 

BIG-IP AAM 		12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.4.0 - 11.6.1 

BIG-IP AFM 		12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.3.0 - 11.6.1 

BIG-IP Analytics 	12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.0.0 - 11.6.1 

BIG-IP APM 		12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.0.0 - 11.6.1
			10.1.0 - 10.2.4 

BIG-IP ASM 		12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.0.0 - 11.6.1	
			10.1.0 - 10.2.4 

BIG-IP DNS 		12.0.0 - 12.1.0 			None 					Medium 		PHP *

BIG-IP Edge Gateway 	11.0.0 - 11.3.0				None 					Medium 		PHP *
			10.1.0 - 10.2.4 

BIG-IP GTM 		11.0.0 - 11.6.1				None 					Medium 		PHP *
			10.1.0 - 10.2.4 

BIG-IP Link Controller 	12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.0.0 - 11.6.1
			10.1.0 - 10.2.4 

BIG-IP PEM 		12.0.0 - 12.1.0				None 					Medium 		PHP *
			11.3.0 - 11.6.1 

BIG-IP PSM 		11.0.0 - 11.4.1				None 					Medium 		PHP *
			10.1.0 - 10.2.4 

BIG-IP WebAccelerator 	11.0.0 - 11.3.0				None 					Medium 		PHP *
			10.1.0 - 10.2.4 

BIG-IP WOM 		11.0.0 - 11.3.0				None 					Medium 		PHP *
			10.1.0 - 10.2.4 

ARX 			None 					6.0.0 - 6.4.0 				Not vulnerable 	None

Enterprise Manager 	3.0.0 - 3.1.1 				None 					Low 		PHP

FirePass 		None 					7.0.0					Not vulnerable 	None
								6.0.0 - 6.1.0 

BIG-IQ Cloud 		4.0.0 - 4.5.0 				None 					Low 		PHP

BIG-IQ Device 		4.2.0 - 4.5.0 				None 					Low 		PHP

BIG-IQ Security 	4.0.0 - 4.5.0 				None 					Low 		PHP

BIG-IQ ADC 		4.5.0 					None 					Low 		PHP

BIG-IQ Centralized 	4.6.0 					None 					Low 		PHP
 Management 

BIG-IQ Cloud and 	1.0.0 					None 					Low 		PHP
 Orchestration 

LineRate 		None 					2.5.0 - 2.6.1 				Not vulnerable 	None

F5 MobileSafe 		None 					1.0.0 					Not vulnerable 	None

F5 WebSafe 		None 					1.0.0 					Not vulnerable 	None

Traffix SDC 		None 					5.0.0					Not vulnerable 	None
								4.0.0 - 4.4.0
								3.3.2 - 3.5.1 

* May only be exploited if an external EAV monitor uses the vulnerable 
function. Standard F5-supplied monitors are not vulnerable. EAV monitors that
do not use the vulnerable PHP functions are not vulnerable.

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values 
published in the previous table. The Severity values and other security 
vulnerability parameters are defined in SOL4602: Overview of the F5 security 
vulnerability response policy.

Supplemental Information

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents

SOL4918: Overview of the F5 critical issue hotfix policy

SOL167: Downloading software and firmware from F5

SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBV0Puxn6ZAP0PgtI9AQJ8AA//UX4ojBM1Hm5EOlWI29tCGsN4emeQzsOW
Ldc7I5nYjT6I9dHslOpVYRLRAmD5pYwQ9xr1fy6CQgVRIq/Vv1uNnzG1qQbZUvWl
1d1wr2BjgX5ysJBkrH9r0bfLa/PDUyURHmfyqAKs8cNzsPNNaAXx1y4Qdb4D5DF9
du57iQDXepS8Sn4umkDCx4gMrNw7619uR1pAHFs3kZ+S26+m0n3qoGHnpP/+0z4t
84AtPKazED5e2akEN0fxyTiE1XP/3ApnHDTf3S8d/jajDZIcmNvFlkxwz1yhzaP3
RbmEUdllivkvs52ATHWUHyn1mN55gpFd7+q20OOIUeyPux5lAftNghVFaSDlwFgY
4jllERG1ieGNWGufX83ZGHQ7BcBTURfhgHs0vxGdDM3k4HEirMQlwnjwGvZsCeE2
WjhXL8TJ1bkifx1eoRYnOYIBvnhKdCNJ/okBKIPEo2TuyvmiKdYX7cGBAY8xrif+
so/fr9RvedFSyJCHuprdbb0TnWogVW+SEmmH/NIit2EDECZrWIaFDA+7hO6rYa+F
Vtzf0eaACyMfamrMiJ6zUutSzaMuV2jVz1n8fvtdEhtdHNckDZIhuFw3V/1pUPpc
wfjHWuL6Xw3QT/x06cOLSdIO/uGmgEdQDcXTW+Bv0anyd1f+IDpn+Nx6g9OROD0A
HKkpe6ZUYLk=
=pzw0
-----END PGP SIGNATURE-----