Multiple MySQL vulnerabilities

2015-04-10T00:50:00
ID F5:K16389
Type f5
Reporter f5
Modified 2017-04-07T22:02:00

Description

F5 Product Development has assigned ID 502493 (BIG-IP) and ID 507720 (Enterprise Manager), to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, BIG-IP iHealth may list Heuristic H515595 on the Diagnostics > Identified > High screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 11.0.0 - 11.5.2
10.0.0 - 10.2.4| 11.6.0
| High| MySQL
BIG-IP AAM| 11.4.0 - 11.5.2| 11.6.0| High| MySQL
BIG-IP AFM| 11.3.0 - 11.5.2| 11.6.0| High| MySQL
BIG-IP Analytics| 11.0.0 - 11.5.2| 11.6.0| High| MySQL
BIG-IP APM| 11.0.0 - 11.5.2
10.1.0 - 10.2.4| 11.6.0| High| MySQL
BIG-IP ASM| 11.0.0 - 11.5.2
10.0.0 - 10.2.4| 11.6.0| High| MySQL
BIG-IP Edge Gateway| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| High| MySQL
BIG-IP GTM| 11.0.0 - 11.5.2
10.0.0 - 10.2.4| 11.6.0| High| MySQL
BIG-IP Link Controller| 11.0.0 - 11.5.2
10.0.0 - 10.2.4| 11.6.0| High| MySQL
BIG-IP PEM| 11.3.0 - 11.5.2| 11.6.0| High| MySQL
BIG-IP PSM| 11.0.0 - 11.4.1
10.0.0 - 10.2.4| None| High| MySQL
BIG-IP WebAccelerator| 11.0.0 - 11.3.0
10.0.0 - 10.2.4| None| High| MySQL
BIG-IP WOM| 11.0.0 - 11.3.0
10.0.0 - 10.2.4| None| High| MySQL
ARX| None| 6.0.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| 3.0.0 - 3.1.1
2.1.0 - 2.3.0| None| High| MySQL
FirePass| None| 7.0.0
6.0.0 - 6.1.0| Not vulnerable| None
BIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None
BIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ ADC| None| 4.5.0| Not vulnerable| None
LineRate| None| 2.4.0 - 2.5.0| Not vulnerable| None
F5 WebSafe| None| 1.0.0| Not vulnerable| None
Traffix SDC| None| 4.0.0 - 4.1.0
3.3.2 - 3.5.1| Not vulnerable| None

Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability for BIG-IP and Enterprise Manager, you should only permit management access to F5 products over a secure network and limit shell access to trusted users. For more information, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x) and K13092: Overview of securing access to the BIG-IP system.

Additionally, for Enterprise Manager, you should not enable the Remote Access feature to provide remote access to the statistical database. If you have enabled the Remote Access feature, you should disable it by performing the following procedure:

Disabling the Remote Access feature

Impact of action: Remote access to the MySQL statistical database will no longer be allowed.

  1. Log in to the Enterprise Manager Configuration utility.
  2. Click Enterprise Management.
  3. Navigate to the Options > Statistics > Remote Access page.
  4. Clear the Allow Remote Access check box.
  5. Click Save Changes.

  6. K9970: Subscribing to email notifications regarding F5 products

  7. K9957: Creating a custom RSS feed to view new and updated documents
  8. K4918: Overview of the F5 critical issue hotfix policy
  9. K167: Downloading software and firmware from F5
  10. K13123: Managing BIG-IP product hotfixes (11.x - 13.x)
  11. K10025: Managing BIG-IP product hotfixes (10.x)
  12. K9502: BIG-IP hotfix matrix