Apache Tomcat vulnerability CVE-2014-0230

2015-08-13T06:33:00
ID F5:K17123
Type f5
Reporter f5
Modified 2017-03-13T23:05:00

Description

F5 Product Development has assigned ID 529405 (BIG-IP and Enterprise Manager), ID 466436 (ARX), and ID CPF-12794 (Traffix SDC) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| 12.1.0| Low| Configuration utility
BIG-IP AAM| 12.0.0
11.4.0 - 11.6.1| 12.1.0| Low| Configuration utility
BIG-IP AFM| 12.0.0
11.3.0 - 11.6.1| 12.1.0| Low| Configuration utility
BIG-IP Analytics| 12.0.0
11.0.0 - 11.6.1| 12.1.0| Low| Configuration utility
BIG-IP APM| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| 12.1.0| Low| Configuration utility
BIG-IP ASM| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| 12.1.0| Low| Configuration utility
BIG-IP Edge Gateway| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Low| Configuration utility
BIG-IP GTM| 11.0.0 - 11.6.1
10.1.0 - 10.2.4| None| Low| Configuration utility
BIG-IP Link Controller| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| 12.1.0| Low| Configuration utility
BIG-IP PEM| 12.0.0
11.3.0 - 11.6.1| 12.1.0| Low| Configuration utility
BIG-IP PSM| 11.0.0 - 11.4.1
10.1.0 - 10.2.4| None| Low| Configuration utility
BIG-IP WebAccelerator| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Low| Configuration utility
BIG-IP WOM| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Low| Configuration utility
ARX| 6.0.0 - 6.4.0| None| Medium| ARX GUI
Enterprise Manager| 3.0.0 - 3.1.1| None| Low| Configuration utility
FirePass| None| 7.0.0
6.0.0 - 6.1.0| Not vulnerable| None
BIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None
BIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ ADC| None| 4.5.0| Not vulnerable| None
LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None
F5 WebSafe| None| 1.0.0| Not vulnerable| None
Traffix SDC| 4.0.0 - 4.4.0
3.3.2 - 3.5.1| None| Low| WebUI

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability for BIG-IP, Enterprise Manager, and BIG-IQ, you should permit access to the Configuration utility only over a secure network and limit login access to trusted users. For more information, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x) and K13092: Overview of securing access to the BIG-IP system.

To mitigate this vulnerability for ARX, you should permit access to the ARX GUI only over a secure network, and limit login access to trusted users.

To mitigate this vulnerability for Traffix, you should permit access to the WebUI only over a secure network, and limit login access to trusted users.