logo
DATABASE RESOURCES PRICING ABOUT US

SQLite vulnerabilities CVE-2015-3414 and CVE-2015-3415

Description

F5 Product Development has assigned IDs 530250 and 530251 (BIG-IP), ID 530268 (BIG-IQ), ID 530269 (Enterprise Manager), ID 528737 (ARX), and INSTALLER-1609 (Traffix SDC) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature ---|---|---|---|--- BIG-IP LTM| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP AAM| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1| Not vulnerable| None BIG-IP AFM| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1| Not vulnerable| None BIG-IP Analytics| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1 11.2.1| Not vulnerable| None BIG-IP APM| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP ASM| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP DNS| None| 12.0.0 - 12.1.0| Not vulnerable| None BIG-IP Edge Gateway| None| 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP GTM| None| 11.4.0 - 11.6.1 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP Link Controller| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP PEM| None| 12.0.0 - 12.1.0 11.4.0 - 11.6.1| Not vulnerable| None BIG-IP PSM| None| 11.4.0 - 11.4.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP WebAccelerator| None| 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None BIG-IP WOM| None| 11.2.1 10.2.1 - 10.2.4| Not vulnerable| None ARX| 6.2.0 - 6.4.0*| None| Low| SQLite Strings Enterprise Manager| None| 3.1.1| Not vulnerable| None FirePass| None| 7.0.0| Not vulnerable| None BIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None BIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None BIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None BIG-IQ ADC| None| 4.5.0| Not vulnerable| None BIG-IQ Centralized Management| None| 4.6.0| Not vulnerable| None BIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None F5 MobileSafe| None| 1.0.0| Not vulnerable| None F5 WebSafe| None| 1.0.0| Not vulnerable| None Traffix SDC| 4.0.0 - 4.4.0* 3.3.2 - 3.5.1*| None| Low| SQLite library * Although the software of the affected F5 products contain the vulnerable code, the affected F5 products do not use the vulnerable code in a way which exposes the vulnerability in a standard configuration. An attacker must have local shell access to the affected F5 products to trigger an exploit. If you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. F5 responds to vulnerabilities in accordance with the **Severity** values published in the previous table. The **Severity** values and other security vulnerability parameters are defined in [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>). To mitigate this vulnerability, you should only permit management access to F5 products over a secure network, and limit shell access to trusted users. * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>) * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>) * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)


Related