Description
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. (CVE-2014-3567)
Impact
This vulnerability could allow a remote attacker to cause a denial-of-service (DoS), and have other unspecified impacts on the system.
Status
F5 Product Development has assigned ID 484635 (BIG-IP), ID 485194 (Enterprise Manager), ID 485191 (BIG-IQ), ID 484708 (FirePass), and ID 410742 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.
To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:
Product | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature |
---|---|---|---|
BIG-IP LTM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.0.0 - 11.4.1 HF6 | |||
10.0.0 - 10.2.4 | |||
12.0.0 | |||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP AAM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.4.0 - 11.4.1 HF6 | 12.0.0 | ||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP AFM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.3.0 - 11.4.1 HF6 | 12.0.0 | ||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP Analytics | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.0.0 - 11.4.1 HF6 | 12.0.0 | ||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP APM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.0.0 - 11.4.1 HF6 | |||
10.1.0 - 10.2.4 | |||
12.0.0 | |||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP ASM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.0.0 - 11.4.1 HF6 | |||
10.0.0 - 10.2.4 | |||
12.0.0 | |||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP DNS | None | 12.0.0 | None |
BIG-IP Edge Gateway | |||
11.0.0 - 11.3.0 | |||
10.1.0 - 10.2.4 | |||
None | |||
Configuration utility | |||
BIG-IP GTM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.0.0 - 11.4.1 HF6 | |||
10.0.0 - 10.2.4 | |||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP Link Controller | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.0.0 - 11.4.1 HF6 | |||
10.0.0 - 10.2.4 | |||
12.0.0 | |||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP PEM | 11.6.0 - 11.6.0 HF2 | ||
11.5.1 - 11.5.1 HF5 | |||
11.5.0 - 11.5.0 HF5 | |||
11.3.0 - 11.4.1 HF6 | 12.0.0 | ||
11.6.0 HF3 | |||
11.5.2 - 11.5.3 | |||
11.5.1 HF6 | |||
11.5.0 HF6 | Configuration utility | ||
BIG-IP PSM | 11.0.0 - 11.4.1 | ||
10.0.0 - 10.2.4 | None | ||
Configuration utility | |||
BIG-IP WebAccelerator | 11.0.0 - 11.3.0 | ||
10.0.0 - 10.2.4 | None | ||
Configuration utility | |||
BIG-IP WOM | 11.0.0 - 11.3.0 | ||
10.0.0 - 10.2.4 | None | ||
Configuration utility | |||
ARX | 6.0.0 - 6.4.0 | ||
None | |||
ARX Manager GUI |
Enterprise Manager| 3.0.0 - 3.1.1 HF4
2.1.0 - 2.3.0| 3.1.1 HF5
| Configuration utility
FirePass| 7.0.0
6.0.0 - 6.1.0| None
| OpenSSL
BIG-IQ Cloud| 4.0.0 - 4.4.0
| 4.5.0
| Configuration utility
BIG-IQ Device| 4.2.0 - 4.4.0
| 4.5.0| Configuration utility
BIG-IQ Security| 4.0.0 - 4.4.0
| 4.5.0| Configuration utility
BIG-IQ ADC| None| 4.5.0| None
LineRate| 2.4.0 - 2.4.1
2.2.0 - 2.2.6
| None| OpenSSL
Recommended action
If you are running a version listed in theVersions known to be vulnerablecolumn, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerablecolumn. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.
To mitigate these vulnerabilities for affected systems, you can restrict access to the Configuration utility to only trusted networks, and limit login access to only trusted users.
Supplemental Information