tcpdump vulnerabilities CVE-2016-7975, CVE-2016-7986, and CVE-2017-5341

2017-03-08T02:06:00
ID F5:K55129614
Type f5
Reporter f5
Modified 2018-04-16T20:37:00

Description

F5 Product Development has assigned ID 644904 (BIG-IP), ID 648098 (BIG-IQ), and ID 648898 (F5 iWorkflow) to this vulnerability. Additionally, BIG-IP iHealth may list Heuristic H55129614 on the Diagnostics > Identified > High screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table.

Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1
11.2.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP AAM | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP AFM | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP Analytics | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1
11.2.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP APM | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1
11.2.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP ASM | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1
11.2.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP DNS | 13.0.0
12.0.0 - 12.1.2 | 13.1.0
13.0.1
12.1.3 | High | tcpdump
BIG-IP Edge Gateway | 11.2.1 | None | High | tcpdump
BIG-IP GTM | 11.4.0 - 11.5.5
11.6.0 - 11.6.1
11.2.1 | 11.6.2
11.5.6 | High | tcpdump
BIG-IP Link Controller | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1
11.2.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP PEM | 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.5.5
11.6.0 - 11.6.1 | 13.1.0
13.0.1
12.1.3
11.6.2
11.5.6 | High | tcpdump
BIG-IP PSM | 11.4.0 - 11.4.1 | None | High | tcpdump
BIG-IP WebAccelerator | 11.2.1 | None | High | tcpdump
BIG-IP WebSafe | 13.0.0
12.0.0 - 12.1.2
11.6.0 - 11.6.1 | 13.1.0
13.0.1
12.1.3
11.6.2 | High | tcpdump
ARX | None | 6.2.0 - 6.4.0 | Not vulnerable | None
Enterprise Manager | None | 3.1.1 | Not vulnerable | None
BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | High | tcpdump
BIG-IQ Device | 4.2.0 - 4.5.0 | None | High | tcpdump
BIG-IQ Security | 4.0.0 - 4.5.0 | None | High | tcpdump
BIG-IQ ADC | 4.5.0 | None | High | tcpdump
BIG-IQ Centralized Management | 5.0.0 - 5.4.0
4.6.0 | None | High | tcpdump
BIG-IQ Cloud and Orchestration | 1.0.0 | None | High | tcpdump
F5 iWorkflow | 2.0.0 - 2.1.0 | None | High | tcpdump
LineRate | None | 2.5.0 - 2.6.2 | Not vulnerable | None
Traffix SDC | None | 5.0.0 - 5.1.0
4.0.0 - 4.4.0 | Not vulnerable | None

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.

Mitigation

To mitigate this vulnerability, you can invoke the -w option in your tcpdump syntax to write raw packets to a pcap file for offline examination. For more information, refer to K411: Overview of packet tracing with the tcpdump utility.

Impact of action: Depending on the method used to gather the packet capture and the amount of active traffic at the time the capture is taken, the capture file size can increase quickly. For more information, refer to K6546: Recommended methods and limitations for running tcpdump on a BIG-IP system.