Lucene search

K
f5F5F5:K15723
HistoryNov 10, 2015 - 12:00 a.m.

K15723 : OpenSSL vulnerability CVE-2014-3567

2015-11-1000:00:00
my.f5.com
11

AI Score

7.5

Confidence

High

EPSS

0.917

Percentile

99.0%

Security Advisory Description

Description

Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. (CVE-2014-3567)

Impact

This vulnerability could allow a remote attacker to cause a denial-of-service (DoS), and have other unspecified impacts on the system.

Status

F5 Product Development has assigned ID 484635 (BIG-IP), ID 485194 (Enterprise Manager), ID 485191 (BIG-IQ), ID 484708 (FirePass), and ID 410742 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Vulnerable component or feature
BIG-IP LTM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.0.0 - 11.4.1 HF6
10.0.0 - 10.2.4
12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP AAM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.4.0 - 11.4.1 HF6 12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP AFM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.3.0 - 11.4.1 HF6 12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP Analytics 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.0.0 - 11.4.1 HF6 12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP APM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.0.0 - 11.4.1 HF6
10.1.0 - 10.2.4
12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP ASM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.0.0 - 11.4.1 HF6
10.0.0 - 10.2.4
12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP DNS None 12.0.0 None
BIG-IP Edge Gateway
11.0.0 - 11.3.0
10.1.0 - 10.2.4
None
Configuration utility
BIG-IP GTM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.0.0 - 11.4.1 HF6
10.0.0 - 10.2.4
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP Link Controller 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.0.0 - 11.4.1 HF6
10.0.0 - 10.2.4
12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP PEM 11.6.0 - 11.6.0 HF2
11.5.1 - 11.5.1 HF5
11.5.0 - 11.5.0 HF5
11.3.0 - 11.4.1 HF6 12.0.0
11.6.0 HF3
11.5.2 - 11.5.3
11.5.1 HF6
11.5.0 HF6 Configuration utility
BIG-IP PSM 11.0.0 - 11.4.1
10.0.0 - 10.2.4 None
Configuration utility
BIG-IP WebAccelerator 11.0.0 - 11.3.0
10.0.0 - 10.2.4 None
Configuration utility
BIG-IP WOM 11.0.0 - 11.3.0
10.0.0 - 10.2.4 None
Configuration utility
ARX 6.0.0 - 6.4.0
None
ARX Manager GUI

Enterprise Manager| 3.0.0 - 3.1.1 HF4
2.1.0 - 2.3.0| 3.1.1 HF5
| Configuration utility
FirePass| 7.0.0
6.0.0 - 6.1.0| None
| OpenSSL
BIG-IQ Cloud| 4.0.0 - 4.4.0
| 4.5.0
| Configuration utility
BIG-IQ Device| 4.2.0 - 4.4.0
| 4.5.0| Configuration utility
BIG-IQ Security| 4.0.0 - 4.4.0
| 4.5.0| Configuration utility
BIG-IQ ADC| None| 4.5.0| None
LineRate| 2.4.0 - 2.4.1
2.2.0 - 2.2.6
| None| OpenSSL

Recommended action

If you are running a version listed in theVersions known to be vulnerablecolumn, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerablecolumn. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.

To mitigate these vulnerabilities for affected systems, you can restrict access to the Configuration utility to only trusted networks, and limit login access to only trusted users.

Supplemental Information