Node.js vulnerability CVE-2015-5380

2015-09-09T00:43:00
ID F5:K17238
Type f5
Reporter f5
Modified 2017-03-14T00:51:00

Description

F5 Product Development has assigned IDs 534090 and 534358 (BIG-IP), ID 537658 (BIG-IQ), and LRS-59013 (LineRate) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.0.0 - 11.4.1
10.1.0 - 10.2.4| Low| f5-rest-node package
BIG-IP AAM| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.4.0 - 11.4.1| Low| f5-rest-node package
BIG-IP AFM| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.3.0 - 11.4.1| Low| f5-rest-node package
BIG-IP Analytics| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.0.0 - 11.4.1| Low| f5-rest-node package
BIG-IP APM| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.0.0 - 11.4.1
10.1.0 - 10.2.4| Low| f5-rest-node package
BIG-IP ASM| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.0.0 - 11.4.1
10.1.0 - 10.2.4| Low| f5-rest-node package
BIG-IP DNS| 12.0.0| 12.1.0
12.0.0 HF3| Low| f5-rest-node package
BIG-IP Edge Gateway| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP GTM| 11.5.0 - 11.6.0| 11.6.1
11.0.0 - 11.4.1
10.1.0 - 10.2.4| Low| f5-rest-node package
BIG-IP Link Controller| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.0.0 - 11.4.1
10.1.0 - 10.2.4| Low| f5-rest-node package
BIG-IP PEM| 12.0.0
11.5.0 - 11.6.0| 12.1.0
12.0.0 HF3
11.6.1
11.3.0 - 11.4.1| Low| f5-rest-node package
BIG-IP PSM| None| 11.0.0 - 11.4.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP WebAccelerator| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP WOM| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| Not vulnerable| None
ARX| None| 6.0.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| None| 3.0.0 - 3.1.1| Not vulnerable| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0| Not vulnerable| None
BIG-IQ Cloud| 4.0.0 - 4.5.0| None| High| BIG-IQ UI node package
f5-rest-node package
BIG-IQ Device| 4.2.0 - 4.5.0| None| High| BIG-IQ UI node package
f5-rest-node package
BIG-IQ Security| 4.0.0 - 4.5.0| None| High| BIG-IQ UI node package
f5-rest-node package
BIG-IQ ADC| 4.5.0| None| High| BIG-IQ UI node package
f5-rest-node package
BIG-IQ Centralized Management| 4.6.0| 5.0.0| High| BIG-IQ UI node package
f5-rest-node package
LineRate| 2.5.0 - 2.6.1| None| Medium| v8, node.js, io.js
F5 WebSafe| None| 1.0.0| Not vulnerable| None
Traffix SDC| None| 4.0.0 - 4.4.0
3.3.2 - 3.5.1| Not vulnerable| None

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

There is no mitigation for this vulnerability. However, F5 recommends that you permit management access to affected F5 products only over a secure network, and limit shell access to trusted users. For more information about securing access to BIG-IP systems, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x) and K13092: Overview of securing access to the BIG-IP system.