-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2056
               sol06045217: TMM vulnerability CVE-2016-5022
                              30 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           BIG-IP LTM
                   BIG-IP AAM
                   BIG-IP AFM
                   BIG-IP Analytics
                   BIG-IP APM
                   BIG-IP ASM
                   BIG-IP DNS
                   BIG-IP Edge Gateway
                   BIG-IP GTM
                   BIG-IP Link Controller
                   BIG-IP PEM
                   BIG-IP PSM
                   BIG-IP WebAccelerator
                   BIG-IP WOM
                   BIG-IP WebSafe
                   ARX
                   Enterprise Manager
                   FirePass
                   BIG-IQ Cloud
                   BIG-IQ Device
                   BIG-IQ Security
                   BIG-IQ AD
                   BIG-IQ Centralized Management
                   BIG-IQ Cloud and Orchestratio
                   F5 iWorkflow
                   LineRate
                   Traffix SDC
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-5022  

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/06/sol06045217.html

- --------------------------BEGIN INCLUDED TEXT--------------------

sol06045217: TMM vulnerability CVE-2016-5022 

Security Advisory

Original Publication Date: 29/08/2016

Vulnerability Description

An unauthenticated remote attacker maybe be able to disrupt services on the 
BIG-IP system with maliciously crafted network traffic. This vulnerability 
affects virtual servers of all types and for all protocols. Self IP addresses 
may also be exposed to this vulnerability. The management interface is not 
affected. (CVE-2016-5022)

Impact

Traffic Management Microkernel (TMM) may restart and temporarily fail to 
process traffic. This issue is related to Packet Filtering, which is enabled by 
default on the BIG-IP system. There is additional risk if the database variable 
tm.acceptipoptions is enabled.

Security Issue Status

F5 Product Development has assigned ID 573124 and ID 472178 (BIG-IP), ID 598543 
(BIG-IQ/iWorkflow) and ID 598546 (Enterprise Manager) to this vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product              Versions known         Versions known to      Severity        Vulnerable component or feature
                     to be vulnerable       be not vulnerable
BIG-IP LTM           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                     11.2.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2
                                            11.2.1 HF16
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP AAM           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                     11.4.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2

BIG-IP AFM           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                     11.4.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2

BIG-IP               12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
 Analytics           11.2.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2
                                            11.2.1 HF16
                                            11.0.0 - 11.1.0

BIG-IP APM           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                     11.2.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2
                                            11.2.1 HF16
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP ASM           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                     11.2.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2
                                            11.2.1 HF16
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP DNS           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                                            12.0.0 HF3

BIG-IP Edge          11.2.0 - 11.3.0        11.2.1 HF16            High            Virtual servers, self IP addresses
 Gateway             11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP GTM           11.2.0 - 11.6.1        11.6.1 HF1             High            Virtual servers, self IP addresses
                                            11.5.4 HF2
                                            11.2.1 HF16
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP Link          12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
 Controller          11.2.0 - 11.6.1        12.0.0 HF
                                            11.6.1 HF1
                                            11.5.4 HF2
                                            11.2.1 HF16
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP PEM           12.0.0 - 12.0.0 HF2    12.1.0                 High            Virtual servers, self IP addresses
                     11.4.0 - 11.6.1        12.0.0 HF3
                                            11.6.1 HF1
                                            11.5.4 HF2

BIG-IP PSM           11.2.0 - 11.4.1        11.2.1 HF16            High            Virtual servers, self IP addresses
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP               11.2.0 - 11.3.0        11.2.1 HF16            High            Virtual servers, self IP addresses
 WebAccelerator      11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP WOM           11.2.0 - 11.3.0        11.2.1 HF16            High            Virtual servers, self IP addresses
                                            11.0.0 - 11.1.0
                                            10.2.1 - 10.2.4

BIG-IP WebSafe       None                   12.0.0 - 12.1.0        Not vulnerable  None
                                            11.6.0 - 11.6.1

ARX                  None                   6.2.0 - 6.4.0          Not vulnerable  None

Enterprise Manager   3.1.1                  None                   Medium          Self IP addresses

FirePass             None                   7.0.0                  Not vulnerable  None

BIG-IQ Cloud         4.0.0 - 4.5.0          None                   Medium          Self IP addresses

BIG-IQ Device        4.2.0 - 4.5.0          None                   Medium          Self IP addresses

BIG-IQ Security      4.0.0 - 4.5.0          None                   Medium          Self IP addresses

BIG-IQ ADC           4.5.0                  None                   Medium          Self IP addresses

BIG-IQ Centralized   5.0.0                  None                   Medium          Self IP addresses
Management

BIG-IQ Cloud and     1.0.0                  None                   Medium          Self IP addresses
Orchestration

F5 iWorkflow         2.0.0                  None                   Medium          Self IP addresses

LineRate             None                   2.5.0 - 2.6.1          Not vulnerable  None

Traffix SDC          None                   5.0.0                  Not vulnerable  None
                                            4.0.0 - 4.4.0

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed 
in the Versions known to be not vulnerable column. If the table lists only an 
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

To reduce your risk of exposure to this vulnerability, ensure that the database 
variable tm.acceptipoptions is disabled. While this issue may be mitigated by 
disabling packet filters, F5 does not recommend this action. There is no other 
mitigation at this time. To disable the database variable tm.acceptipoptions, 
perform the following procedure:

Impact of procedure: Disabling this database variable will prevent the system 
from processing IPv4 packets with IP options; this may affect VXLAN if 
configured.

    Log in to the Traffic Management Shell (tmsh) by typing the following 
    command:

    tmsh
    Disable the database variable tm.acceptipoptions by typing the following 
    command:

    modify sys db tm.acceptipoptions value disable

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products
    SOL9957: Creating a custom RSS feed to view new and updated documents
    SOL4602: Overview of the F5 security vulnerability response policy
    SOL4918: Overview of the F5 critical issue hotfix policy
    SOL167: Downloading software and firmware from F5
    SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=gPn6
-----END PGP SIGNATURE-----