Lucene search

K
f5F5F5:K16847
HistoryJul 03, 2015 - 12:14 a.m.

Apache vulnerabilities CVE-2014-8109, CVE-2014-3581, CVE-2014-3583

2015-07-0300:14:00
support.f5.com
70

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.066 Low

EPSS

Percentile

93.0%

Description

mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.

The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.

The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.

Impact

There is no impact; F5 products are not affected by these vulnerabilities.

Status

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Severity Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP AAM None 11.4.0 - 11.6.0 Not vulnerable None
BIG-IP AFM None 11.3.0 - 11.6.0 Not vulnerable None
BIG-IP Analytics None 11.0.0 - 11.6.0 Not vulnerable None
BIG-IP APM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP ASM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP Edge Gateway
None 11.0.0 - 11.3.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP GTM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP Link Controller None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP PEM None 11.3.0 - 11.6.0 Not vulnerable None
BIG-IP PSM None 11.0.0 - 11.4.1
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP WebAccelerator None 11.0.0 - 11.3.0
10.1.0 - 10.2.4 Not vulnerable None
BIG-IP WOM None 11.0.0 - 11.3.0
10.1.0 - 10.2.4 Not vulnerable None
ARX None
6.0.0 - 6.4.0
Not vulnerable None

Enterprise Manager | None
| 3.0.0 - 3.1.1 | Not vulnerable | None
FirePass | None
| 7.0.0
6.0.0 - 6.1.0
| Not vulnerable | None

BIG-IQ Cloud | None | 4.0.0 - 4.5.0 | Not vulnerable | None
BIG-IQ Device | None | 4.2.0 - 4.5.0 | Not vulnerable | None
BIG-IQ Security | None | 4.0.0 - 4.5.0 | Not vulnerable | None
BIG-IQ ADC | None | 4.0.0 - 4.5.0 | Not vulnerable | None
LineRate | None
| 2.5.0 - 2.6.0
| Not vulnerable | None

F5 WebSafe | None
| 1.0.0
| Not vulnerable | None

Traffix SDC | None
| 4.0.0 - 4.4.0
3.3.2 - 3.5.1
| Not vulnerable | None

Recommended Action

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.

Supplemental Information

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.066 Low

EPSS

Percentile

93.0%