Lucene search

K
f5F5F5:K15571
HistorySep 05, 2014 - 12:00 a.m.

K15571 : OpenSSL vulnerability CVE-2014-3508

2014-09-0500:00:00
my.f5.com
20

4.7 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.009 Low

EPSS

Percentile

80.8%

Security Advisory Description

Description

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of ‘\0’ characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions. (CVE-2014-3508)

Impact

Applications may be affected if they use pretty printing to echo output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.

Status

F5 Product Development has assigned ID 474757 (LineRate) and ID 410742 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.0.0 - 10.2.4
None
BIG-IP AAM None 11.4.0 - 11.6.0 None
BIG-IP AFM None 11.3.0 - 11.6.0 None
BIG-IP Analytics None 11.0.0 - 11.6.0 None
BIG-IP APM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 None
BIG-IP ASM None 11.0.0 - 11.6.0
10.0.0 - 10.2.4 None
BIG-IP Edge Gateway
None 11.0.0 - 11.3.0
10.1.0 - 10.2.4 None
BIG-IP GTM None 11.0.0 - 11.6.0
10.0.0 - 10.2.4 None
BIG-IP Link Controller None
11.0.0 - 11.6.0
10.0.0 - 10.2.4
None
BIG-IP PEM None
11.3.0 - 11.6.0
None
BIG-IP PSM None 11.0.0 - 11.4.1
10.0.0 - 10.2.4 None
BIG-IP WebAccelerator None 11.0.0 - 11.3.0
10.0.0 - 10.2.4 None
BIG-IP WOM None 11.0.0 - 11.3.0
10.0.0 - 10.2.4 None
ARX 6.0.0 - 6.4.0 None
Configuration utility

Enterprise Manager| None| 3.0.0 - 3.1.1
2.1.0 - 2.3.0| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0| None
BIG-IQ Cloud| None
| 4.0.0 - 4.5.0
| None
BIG-IQ Device| None
| 4.2.0 - 4.5.0
| None
BIG-IQ Security| None
| 4.0.0 - 4.5.0
| None
BIG-IQ ADC| None| 4.5.0| None
LineRate| 2.4.0
2.3.0 - 2.3.1
2.2.0 - 2.2.4| 2.4.1
2.3.2
2.2.5| Command-line interface
BIG-IP Edge Clients for Android| None
| 2.0.0 - 2.0.5| None

BIG-IP Edge Clients for Apple iOS| None
| 2.0.0 - 2.0.2
1.0.5 - 1.0.6| None
BIG-IP Edge Clients for Linux| None
| 6035.* - 7110.*| None

BIG-IP Edge Clients for MAC OS X| None
| 6035.* - 7110.*
| None
BIG-IP Edge Clients for Windows| None| 6035.* - 7110.*
| None

BIG-IP Edge Portal for Android| None| 1.0.0 - 1.0.2| None
BIG-IP Edge Portal for Apple iOS| None| 1.0.0 - 1.0.3| None

Recommended Action

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined in K4602: Overview of the F5 security vulnerability response policy.

Supplemental Information

4.7 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.009 Low

EPSS

Percentile

80.8%