Nginx vulnerabilities CVE-2016-0742, CVE-2016-0746, and CVE-2016-0747

2016-05-11T20:31:00
ID F5:K23073482
Type f5
Reporter f5
Modified 2017-03-30T22:21:00

Description

F5 Product Development has assigned ID 588359 (BIG-IQ and F5 iWorkflow) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, BIG-IP iHealth may list Heuristic H23073482 on the Diagnostics > Identified > Low screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| None| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP AAM| None| 12.0.0
11.4.0 - 11.6.1| Not vulnerable| None
BIG-IP AFM| None| 12.0.0
11.3.0 - 11.6.1| Not vulnerable| None
BIG-IP Analytics| None| 12.0.0
11.0.0 - 11.6.1| Not vulnerable| None
BIG-IP APM| None| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP ASM| None| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP DNS| None| 12.0.0| Not vulnerable| None
BIG-IP Edge Gateway| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP GTM| None| 11.0.0 - 11.6.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP Link Controller| None| 12.0.0
11.0.0 - 11.6.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP PEM| None| 12.0.0
11.3.0 - 11.6.1| Not vulnerable| None
BIG-IP PSM| None| 11.0.0 - 11.4.1
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP WebAccelerator| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| Not vulnerable| None
BIG-IP WOM| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| Not vulnerable| None
ARX| None| 6.0.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| None| 3.0.0 - 3.1.1| Not vulnerable| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0| Not vulnerable| None
BIG-IQ Cloud| 4.3.0 - 4.5.0| 4.0.0 - 4.2.0| Low| Nginx#
BIG-IQ Device| 4.3.0 - 4.5.0| 4.2.0| Low| Nginx#
BIG-IQ Security| 4.3.0 - 4.5.0| 4.0.0 - 4.2.0| Low| Nginx#
BIG-IQ ADC| 4.5.0| None| Low| Nginx#
BIG-IQ Centralized Management| 5.0.0
4.6.0| 5.1.0| Low| Nginx#
BIG-IQ Cloud and Orchestration| 1.0.0| None| Low| Nginx#
F5 iWorkflow| 2.0.0 - 2.0.1| 2.0.2| Low| Nginx#
LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None
F5 WebSafe| None| 1.0.0| Not vulnerable| None
Traffix SDC| None| 4.0.0 - 4.4.0
3.3.2 - 3.5.1| Not vulnerable| None

The Nginx RPM package name is rebranded as webd beginning in BIG-IQ 4.4.0, BIG-IQ Centralized Management 4.6.0, and BIG-IQ Cloud and Orchestration 1.0.0.

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

Removing the outbound reverse SSL proxy configuration in the webd or nginx configuration

To mitigate this vulnerability, you can remove the outbound reverse SSL proxy configuration in the nginx or webd configuration file. To do so, perform one of the following procedures, depending on the affected BIG-IQ version:

Impact of action: This procedure involves restarting the webd or nginx daemon, which causes the BIG-IQ user interface to be inaccessible. F5 recommends performing this procedure during a scheduled maintenance window.

BIG-IQ Centralized Management 5.0.0 and 4.6.0, iWorkflow 2.0.0 and 2.0.1, BIG-IQ Cloud and Orchestration 1.0.0, and BIG-IQ 4.4.0 through 4.5.0

The webd configuration file is located at /etc/webd/webd.conf. To remove the outbound reverse SSL proxy configuration in the webd configuration file, perform the following procedure:

  1. Log in to the BIG-IQ system's advance shell using administrator role credentials.
  2. Stop the webd process by typing the following command:

tmsh stop sys service webd

  1. Back up a copy of the webd configuration file using the following command syntax:

cp -a /etc/webd/webd.conf /etc/webd/webd.conf.backup

  1. Using a text editor of your choice, modify the webd configuration file.
  2. Locate the outbound reverse SSL proxy configuration stanza that may appear similar to the following example:

Outbound http to https proxy

Used by the REST framework's HTTPD signing endpoint

server {
listen 127.0.0.1:80;
location ~ /proxy/(.+) {
resolver 8.8.8.8;
proxy_pass https://$1$is_args$args;
}
}

  1. Remove the outbound reverse SSL proxy configuration stanza, save the changes, and exit the text editor.
  2. Start the webd process by typing the following command:

tmsh start sys service webd

BIG-IQ 4.3.0

The nginx configuration file is located at /etc/nginx/nginx.conf. To remove the outbound reverse SSL proxy configuration in the nginx configuration file, perform the following procedure:

  1. Log in to the BIG-IQ system's advance shell using administrator role credentials.
  2. Stop the nginx process by typing the following command:

tmsh stop sys service nginx

  1. Back up a copy of the nginx configuration file using the following command syntax:

cp -a /etc/webd/nginx.conf /etc/webd/nginx.conf.backup

  1. Using a text editor of your choice, modify the nginx configuration file.
  2. Locate the outbound reverse SSL proxy configuration stanza that may appear similar to the following example:

Outbound http to https proxy

Used by the REST framework's HTTPD signing endpoint

server {
listen 127.0.0.1:80;
location ~ /proxy/(.+) {
resolver 8.8.8.8;
proxy_pass https://$1$is_args$args;
}
}

  1. Remove the outbound reverse SSL proxy configuration stanza, save the changes, and exit the text editor.
  2. Start the nginx process by typing the following command:

tmsh start sys service nginx