Lucene search

K
f5F5F5:K6734
HistoryMar 27, 2013 - 12:00 a.m.

K6734 : Local OpenSSL vulnerabilities VU#547300 and VU#386964, CAN-2006-3738, CAN-2006-2940, CAN-2006-2937, CAN-2006-4343

2013-03-2700:00:00
my.f5.com
12

9.6 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.962 High

EPSS

Percentile

99.4%

Security Advisory Description

Note: For information about signing up to receive security notice updates from F5, refer to K9970: Subscribing to email notifications regarding F5 products.

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.0.0 - 9.1.2
9.2.0 - 9.2.5
9.4.0 - 9.4.1 9.1.3
9.3.x
9.4.2 - 9.4.8
9.6.x
10.x
11.x
BIG-IP GTM 9.2.0 - 9.2.5
9.4.0 - 9.4.1 9.3.x
9.4.2 - 9.4.8
10.x
11.x
BIG-IP ASM 9.2.0 - 9.2.5
9.4.0 - 9.4.1 9.3.x
9.4.2 - 9.4.8
10.x
11.x
BIG-IP Link Controller 9.2.2 - 9.2.5
9.4.0 - 9.4.1 9.3.x
9.4.2 - 9.4.8
10.x
11.x
BIG-IP WebAccelerator 9.4.0 - 9.4.1 9.4.2 - 9.4.8
10.x
11.x
BIG-IP PSM None 9.4.5 - 9.4.8
10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM
None 11.x
FirePass 3.x
4.x
5.0.0 - 5.5.1 5.5.2
6.x
7.x
Enterprise Manager 1.0.0 - 1.2.2 1.4.0 - 1.8.0
2.x
3.x

This security advisory describes the following local OpenSSL vulnerabilities:

  • Denial of Service Attacks (CVE-2006-2937, CVE-2006-2940)
  • SSL_get_shared_ciphers() buffer overflow (CVE-2006-3738)
  • SSLv2 Client Crash (CVE-2006-4343)

Information about this advisory is available at the following location:

<http://www.openssl.org/news/secadv_20060928.txt&gt;

Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

F5 Product Development tracked this issue as CR70064, CR70063, CR69852, and CR69854 for BIG-IP LTM, GTM, ASM and Link Controller, and it was fixed in BIG-IP 9.1.3, 9.3.0, and 9.4.2. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, or Link Controller release notes.

F5 Product Development tracked this issue as CR69955, CR70725, CR70726 and CR77281 for FirePass, and it was fixed in FirePass 5.5.2. For information about upgrading, refer to the FirePass release notes.

Additionally, a hotfix with the appropriate fixes is available for FirePass version 5.5.0. Customers affected by this issue can contact F5 Technical Support, referencing this article number, to request the hotfix.

F5 Product Development tracked this issue as CR69892 for Enterprise Manager, and it was fixed in Enterprise Manager 1.4.0. For information about upgrading, refer to the Enterprise Manager release notes.

9.6 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.962 High

EPSS

Percentile

99.4%