Mozilla NSS vulnerabilities CVE-2015-7181, CVE-2015-7182, and CVE-2015-7183

2015-12-09T20:46:00
ID F5:K31372672
Type f5
Reporter f5
Modified 2016-05-24T01:48:00

Description

F5 Product Development has assigned ID 556383 (BIG-IP), ID 561855 (BIG-IQ), and ID 561858 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 12.0.0
11.6.0
11.0.0 - 11.5.3
10.1.0 - 10.2.4| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP AAM| 12.0.0
11.6.0
11.4.0 - 11.5.3| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP AFM| 12.0.0
11.6.0
11.3.0 - 11.5.3| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP Analytics| 12.0.0
11.6.0
11.0.0 - 11.5.3| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP APM| 12.0.0
11.6.0
11.0.0 - 11.5.3
10.1.0 - 10.2.4| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP ASM| 12.0.0
11.6.0
11.0.0 - 11.5.3
10.1.0 - 10.2.4| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP DNS| 12.0.0| 12.1.0| Medium| NSS libraries
BIG-IP Edge Gateway| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Medium| NSS libraries
BIG-IP GTM| 11.6.0
11.0.0 - 11.5.3
10.1.0 - 10.2.4| 11.6.1
11.5.4| Medium| NSS libraries
BIG-IP Link Controller| 12.0.0
11.6.0
11.0.0 - 11.5.3
10.1.0 - 10.2.4| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP PEM| 12.0.0
11.6.0
11.3.0 - 11.5.3| 12.1.0
11.6.1
11.5.4| Medium| NSS libraries
BIG-IP PSM| 11.0.0 - 11.4.1
10.1.0 - 10.2.4| None| Medium| NSS libraries
BIG-IP WebAccelerator| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Medium| NSS libraries
BIG-IP WOM| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Medium| NSS libraries
ARX| None| 6.0.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| 3.0.0 - 3.1.1| None| Medium| NSS libraries
FirePass| None| 7.0.0
6.0.0 - 6.1.0| Not vulnerable| None
BIG-IQ Cloud| 4.0.0 - 4.5.0| None| Medium| NSS libraries
BIG-IQ Device| 4.2.0 - 4.5.0| None| Medium| NSS libraries
BIG-IQ Security| 4.0.0 - 4.5.0| None| Medium| NSS libraries
BIG-IQ ADC| 4.5.0| None| Medium| NSS libraries
BIG-IQ Centralized Management| 4.6.0| None| Medium| NSS libraries
BIG-IQ Cloud and Orchestration| 1.0.0| None| Medium| NSS libraries
LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None
F5 WebSafe| None| 1.0.0| Not vulnerable| None
Traffix SDC| None| 4.0.0 - 4.4.0
3.3.2 - 3.5.1| Not vulnerable| None

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability for affected F5 products, you should permit management access to F5 products only over a secure network and limit shell access to trusted users. For more information about securing access to the BIG-IP or Enterprise Manager systems, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x - 12.x) and K13092: Overview of securing access to the BIG-IP system.