OpenSSL vulnerability CVE-2014-3508

2014-09-06T02:46:00
ID F5:K15571
Type f5
Reporter f5
Modified 2016-01-09T02:20:00

Description

Description

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions. (CVE-2014-3508)

Impact

Applications may be affected if they use pretty printing to echo output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.

Status

F5 Product Development has assigned ID 474757 (LineRate) and ID 410742 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature
---|---|---|---
BIG-IP LTM | None
| 11.0.0 - 11.6.0
10.0.0 - 10.2.4
| None
BIG-IP AAM | None | 11.4.0 - 11.6.0 | None
BIG-IP AFM | None | 11.3.0 - 11.6.0 | None
BIG-IP Analytics | None | 11.0.0 - 11.6.0 | None
BIG-IP APM | None | 11.0.0 - 11.6.0
10.1.0 - 10.2.4 | None
BIG-IP ASM | None | 11.0.0 - 11.6.0
10.0.0 - 10.2.4 | None
BIG-IP Edge Gateway
| None | 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | None
BIG-IP GTM | None | 11.0.0 - 11.6.0
10.0.0 - 10.2.4 | None
BIG-IP Link Controller | None
| 11.0.0 - 11.6.0
10.0.0 - 10.2.4
| None
BIG-IP PEM | None
| 11.3.0 - 11.6.0
| None
BIG-IP PSM | None | 11.0.0 - 11.4.1
10.0.0 - 10.2.4 | None
BIG-IP WebAccelerator | None | 11.0.0 - 11.3.0
10.0.0 - 10.2.4 | None
BIG-IP WOM | None | 11.0.0 - 11.3.0
10.0.0 - 10.2.4 | None
ARX | 6.0.0 - 6.4.0 | None
| Configuration utility

Enterprise Manager | None | 3.0.0 - 3.1.1
2.1.0 - 2.3.0 | None
FirePass | None | 7.0.0
6.0.0 - 6.1.0 | None
BIG-IQ Cloud | None
| 4.0.0 - 4.5.0
| None
BIG-IQ Device | None
| 4.2.0 - 4.5.0
| None
BIG-IQ Security | None
| 4.0.0 - 4.5.0
| None
BIG-IQ ADC | None | 4.5.0 | None
LineRate | 2.4.0
2.3.0 - 2.3.1
2.2.0 - 2.2.4 | 2.4.1
2.3.2
2.2.5 | Command-line interface
BIG-IP Edge Clients for Android | None
| 2.0.0 - 2.0.5 | None

BIG-IP Edge Clients for Apple iOS | None
| 2.0.0 - 2.0.2
1.0.5 - 1.0.6 | None
BIG-IP Edge Clients for Linux | None
| 6035. - 7110. | None

BIG-IP Edge Clients for MAC OS X | None
| 6035. - 7110.
| None
BIG-IP Edge Clients for Windows | None | 6035. - 7110.
| None

BIG-IP Edge Portal for Android | None | 1.0.0 - 1.0.2 | None
BIG-IP Edge Portal for Apple iOS | None | 1.0.0 - 1.0.3 | None

Recommended Action

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined in K4602: Overview of the F5 security vulnerability response policy.

Supplemental Information