Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.1142 K87141725: BIG-IP APM redirect vulnerability CVE-2017-0302 8 May 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: F5 BIG-IP APM Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-0302 Original Bulletin: https://support.f5.com/csp/article/K87141725 - --------------------------BEGIN INCLUDED TEXT-------------------- K87141725: BIG-IP APM redirect vulnerability CVE-2017-0302 Security Advisory Original Publication Date: May 05, 2017 Updated Date: May 05, 2017 Applies to (see versions): Security Advisory Description Insufficient boundary checks on the request URL may cause the tmm process to assert when the user is redirected back to the original request URL following successful authentication to the BIG-IP APM system.(CVE-2017-0302) Impact An authenticated user with an established access session to the BIG-IP APM system may be able to cause a traffic disruption if the length of the requested URL is less than 16 characters. Security Advisory Status F5 Product Development has assigned ID 641612 (BIG-IP) to this vulnerability. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product Versions known to be vulnerable Versions known to be not vulnerable Severity Vulnerable component or feature BIG-IP LTM None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 BIG-IP AAM None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 BIG-IP AFM None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 BIG-IP Analytics None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 BIG-IP APM 13.0.0 13.0.0 HF2 Medium TMM 12.1.0 - 12.1.2 12.1.2 HF1 12.0.0 11.4.0 - 11.6.1 11.2.1 BIG-IP ASM None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 BIG-IP DNS None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 BIG-IP Edge Gateway None 11.2.1 Not vulnerable None BIG-IP GTM None 11.4.0 - 11.6.1 Not vulnerable None 11.2.1 BIG-IP Link Controller None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 BIG-IP PEM None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.4.0 - 11.6.1 BIG-IP PSM None 11.4.0 - 11.4.1 Not vulnerable None BIG-IP WebAccelerator None 11.2.1 Not vulnerable None BIG-IP WebSafe None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 11.6.0 - 11.6.1 ARX None 6.2.0 - 6.4.0 Not vulnerable None Enterprise Manager None 3.1.1 Not vulnerable None BIG-IQ Cloud None 4.0.0 - 4.5.0 Not vulnerable None BIG-IQ Device None 4.2.0 - 4.5.0 Not vulnerable None BIG-IQ Security None 4.0.0 - 4.5.0 Not vulnerable None BIG-IQ ADC None 4.5.0 Not vulnerable None BIG-IQ Centralized Management None 5.0.0 - 5.1.0 Not vulnerable None 4.6.0 BIG-IQ Cloud and Orchestration None 1.0.0 Not vulnerable None F5 iWorkflow None 2.0.0 - 2.1.0 Not vulnerable None LineRate None 2.5.0 - 2.6.2 Not vulnerable None Traffix SDC None 5.0.0 - 5.1.0 Not vulnerable None 4.0.0 - 4.4.0 Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation None Supplemental Information K9970: Subscribing to email notifications regarding F5 products K9957: Creating a custom RSS feed to view new and updated documents K4602: Overview of the F5 security vulnerability response policy K4918: Overview of the F5 critical issue hotfix policy K167: Downloading software and firmware from F5 K13123: Managing BIG-IP product hotfixes (11.x - 13.x) K9502: BIG-IP hotfix matrix K6664: Obtaining and installing OPSWAT hotfixes K10942: Installing OPSWAT hotfixes on BIG-IP APM systems - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWRAEmIx+lLeg9Ub1AQhtdw/8DzIplIlGrfcPsqiKqE0QBtuegLt/BedG sb4c5i26usBEZPYgN5Acvzjd0ZEz0m+cj3H5DxXEP5ZprBGA/JWtgZBIgxDYCV2P SdFqIz+7yeVc2EAZNO68xOh2rYhfad1oj3iS4kgPufFB/eeCtE0T/7aTv+6pclk6 iWXra6xooPydFPPCPQoYwFn4261DPupAwH1K5PSfJJfuQm+kOQfg1l0cpPdrXAkP iS2AxpjZV4r6RvFQQVRZ5cOqbOe53W/BF3BflveYkfKaM3euA+ccgHaIzaFr5ZkC z+I4VxEOy6ry3jFonhVBSqm2msdIPCG5q3Kbyc4/kd2L2w0h+2vselRvtF4Fk2gv 8lanMhZdwU1qGByxtPYoggr9vVxVtYK2ZOQtg1pt7ld+kSKcc8+M8A0jKTQJz2sW IOLcyoxmBmhpfTjb7muFphmXkehPDew4jLOk3OO2IlXo3a9/FqofY1AVGshlUJKD AXZHlBzpOaNbXY8C8umMYpC3uGrsxsUYM05MdtKMoo+tiItLEuUnzwozYnG7458M huCtWzef4i08kTgg8lzS/TnV0pTpzLPuy4qXWJQcI9XVXRB3HMRoTuRFrFqPQO+g e77X8TEmaM+TPZJ7eXOh77mLgid+7tZb2M0JsgM0p2BCX4WbqAdAui/goAi8ywsC 3Zb0SMQJnNc= =24JN -----END PGP SIGNATURE-----