libxml2 vulnerability CVE-2015-8806

2017-02-23T01:58:00
ID F5:K04450715
Type f5
Reporter f5
Modified 2017-04-04T00:27:00

Description

F5 Product Development has assigned IDs 595231 and 601059 (BIG-IP), ID 605255 (BIG-IQ/Enterprise Manager), and ID 646652 (F5 iWorkflow) to this vulnerability. Additionally, BIG-IP iHealth may list Heuristic H04450715 on the Diagnostics > Identified > Medium screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1| 12.1.2| Medium| SSH plugin, XML content-based routing, monitors, Python, Perl and Qkview
BIG-IP AAM| 12.0.0 - 12.1.1
11.4.0 - 11.6.1| 12.1.2| Medium| Image optimization, monitors, Python, Perl and Qkview
BIG-IP AFM| 12.0.0 - 12.1.1
11.4.0 - 11.6.1| 12.1.2| Medium| Monitors, Python, Perl and Qkview
BIG-IP Analytics| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1| 12.1.2| Medium| Monitors, Python, Perl and Qkview
BIG-IP APM| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1| 12.1.2| Medium| VDI, ifmap, monitors, Python, Perl and Qkview
BIG-IP ASM| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1| 12.1.2| Medium| SSH plugin, xml content-based routing, monitors, Python, Perl and Qkview
BIG-IP DNS| 12.0.0 - 12.1.1| 12.1.2| Medium| Monitors, Python, Perl and Qkview
BIG-IP Edge Gateway| 11.2.1| None| Medium| Image optimization, monitors, Python, Perl and Qkview
BIG-IP GTM| 11.4.0 - 11.6.1
11.2.1| None| Medium| Monitors, Python, Perl and Qkview
BIG-IP Link Controller| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1| 12.1.2| Medium| Monitors, Python, Perl and Qkview
BIG-IP PEM| 12.0.0 - 12.1.1
11.4.0 - 11.6.1| 12.1.2| Medium| Monitors, Python, Perl and Qkview
BIG-IP PSM| 11.4.0 - 11.4.1| None| Medium| Monitors, Python, Perl and Qkview
BIG-IP WebAccelerator| 11.2.1| None| Medium| Image optimization, monitors, Python, Perl and Qkview
BIG-IP WebSafe| 12.0.0 - 12.1.1
11.6.0 - 11.6.1| 12.1.2| Medium| Monitors, Python, Perl and Qkview
ARX| None| 6.2.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| 3.1.1| None| Medium| libxml2
BIG-IQ Cloud| 4.0.0 - 4.5.0| None| Medium| libxml2
BIG-IQ Device| 4.2.0 - 4.5.0| None| Medium| libxml2
BIG-IQ Security| 4.0.0 - 4.5.0| None| Medium| libxml2
BIG-IQ ADC| 4.5.0| None| Medium| libxml2
BIG-IQ Centralized Management| 5.0.0 - 5.1.0
4.6.0| None| Medium| libxml2
BIG-IQ Cloud and Orchestration| 1.0.0| None| Medium| libxml2
F5 iWorkflow| 2.0.0 - 2.0.2| None| Medium| libxml2
LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None
Traffix SDC| 5.0.0 - 5.1.0
4.0.0 - 4.4.0| None| Medium| libxml2

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.

Mitigation

None