Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.1143 K23440942: Insufficient validation of ICMP error messages CVE-2004-0790 (11.x- 13.x) 8 May 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: F5 Products Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2004-0790 Reference: AA-2006.0080 ESB-2006.0004 - --------------------------BEGIN INCLUDED TEXT-------------------- K23440942: Insufficient validation of ICMP error messages CVE-2004-0790 (11.x - - 13.x) Security Advisory Original Publication Date: May 05, 2017 Updated Date: May 05, 2017 Applies to (see versions): Security Advisory Description The vulnerability described in this article was initially fixed in earlier versions, but a regression was reintroduced in BIG-IP 12.x through 13.x. For information about earlier versions, refer to K4583: Insufficient validation of ICMP error messages - VU#222750 / CVE-2004-0790 (9.x - 10.x). Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. (CVE-2004-0790) Impact A remote attacker can interfere with the Path MTU Discovery process and cause a performance degradation or reset of FastL4 accelerated TCP connections by spoofing a specifically crafted ICMP message. This vulnerability only applies to FastL4 virtual servers on BIG-IP platforms with the embedded Packet Velocity Acceleration (ePVA) chip. The ePVA chip is a hardware acceleration Field Programmable Gate Array (FPGA) that delivers high-performance Layer 4 (L4) IPv4 throughput. The ePVA chips are included on the following BIG-IP platforms: B2100 Blade in the VIPRION C2400 or C2200 Chassis B2150 Blade in the VIPRION C2400 or C2200 Chassis B2250 Blade in the VIPRION C2400 or C2200 Chassis B4300 Blade in the VIPRION C4480 or C4800 Chassis B4340 Blade in the VIPRION C4480 or C4800 Chassis BIG-IP 12000 series BIG-IP 10000 series BIG-IP 7000 series BIG-IP 5000 series BIG-IP i5000 series BIG-IP i7000 series BIG-IP i10000 series Security Advisory Status F5 Product Development has assigned ID 635933 (BIG-IP) to this vulnerability. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product Versions known to be vulnerable Versions known to be not vulnerable Severity Vulnerable component or feature BIG-IP LTM 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP AAM 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP AFM 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP Analytics 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP APM 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP ASM 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP DNS None 13.0.0 Not vulnerable None 12.0.0 - 12.1.2 BIG-IP Edge Gateway None 11.2.1 Not vulnerable None BIG-IP GTM None 11.4.0 - 11.6.1 Not vulnerable None 11.2.1 BIG-IP Link Controller 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP PEM 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.4.0 - 11.6.1[1] BIG-IP PSM None 11.4.0 - 11.4.1 Not vulnerable None BIG-IP WebAccelerator None 11.2.1 Not vulnerable None BIG-IP WebSafe 13.0.0 13.0.0 HF1[1] Low Accellerated FastL4 virtual server connection flows on ePVA equipped platforms 12.0.0 - 12.1.2 12.1.2 HF1[1] 11.6.0 - 11.6.1[1] ARX None 6.2.0 - 6.4.0 Not vulnerable None Enterprise Manager None 3.1.1 Not vulnerable None BIG-IQ Cloud None 4.0.0 - 4.5.0 Not vulnerable None BIG-IQ Device None 4.2.0 - 4.5.0 Not vulnerable None BIG-IQ Security None 4.0.0 - 4.5.0 Not vulnerable None BIG-IQ ADC None 4.5.0 Not vulnerable None BIG-IQ Centralized Management None 5.0.0 - 5.1.0 Not vulnerable None 4.6.0 BIG-IQ Cloud and Orchestration None 1.0.0 Not vulnerable None F5 iWorkflow None 2.0.0 - 2.1.0 Not vulnerable None LineRate None 2.5.0 - 2.6.2 Not vulnerable None Traffix SDC None 5.0.0 - 5.1.0 Not vulnerable None 4.0.0 - 4.4.0 [1] The fix in BIG-IP 13.0.0 HF1, 12.1.2 HF1, 11.6.1 HF2, and 11.5.4 HF3 introduces the Pva.ValidateTcpSeqInICMP database variable set to a default value of true. With this value set to true, the BIG-IP system is Not vulnerable to CVE-2004-0790. However, some specific FastL4 accelerated traffic conditions may require the Pva.Validate.TcpSeqInICMP database variable to be configured as False. With this value set to false, FastL4 virtual server connections are susceptible to CVE-2004-0790. Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation None Supplemental Information K12837: Overview of the ePVA feature K9970: Subscribing to email notifications regarding F5 products K9957: Creating a custom RSS feed to view new and updated documents K4602: Overview of the F5 security vulnerability response policy K4918: Overview of the F5 critical issue hotfix policy K167: Downloading software and firmware from F5 K13123: Managing BIG-IP product hotfixes (11.x - 13.x) K9502: BIG-IP hotfix matrix - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWRAFA4x+lLeg9Ub1AQgYnhAAj6+xfcEsbZ0FLm/kY7kXv4E6Gzh2856m jET+4BJVKwagenVIJhsW/lpmgo88vJ3ec8t5PGkaAkS6DGivQFHKCDBBRfzGOKpp wJllg7vEiUJ8Ana7B6KusGgVv12JT1t2uggCd+c/jQbWx0r133tBQdNg6j2F+rWM TvT96fQLcx1bjpmoifodfcZvdx3KF5IM/fhCnssgYQhcGQ5FQ3icZ0BFDgneYhJR pwtotTz4OujSJuwgRoMRxb6BRpOJ87OuLWM363wg116S7ZUxm9MSs3KgQW59cDQ0 p1KnB0cG8dhJyv2HtR6jl6uI+85VTgev+TulIAk/XZhQF1sim23MWj8LUl7ItCbk 1u9/X0OIbx/112uR5fc0X2WR123y9Ased8DjUOm/JF4AOhmhVDFs/EIVsqtKJ0/7 Zgz+v2AeqTZhW1nFGfzbIYKUEd6dWWVyW75N/Qy4PdZNa6vpx00QJyeyapwi04Ne R+9VvgbwD6jB6GLceczGe04qFDUOOZUoheOswryHxqa0zLWEzit0i8D7WDQD7Jzw BUKruB8X7SwL+kt/vGWvqQjarmCvNEzocXiCPYNvqjI+He68ymgbOZ+lbYxHdigu f/AIdPKwGJrxThUWSCWnDmMMvkecR4QvLQs20VI6rOVOmuDjhA2dXhCkzo12AevE PPX6Rw0YFXw= =jO00 -----END PGP SIGNATURE-----