logo
DATABASE RESOURCES PRICING ABOUT US

Bash vulnerability CVE-2016-7543

Description

F5 Product Development has assigned IDs 640493 and 652539 (BIG-IP), ID 640635 (BIG-IQ), ID 641734 (iWorkflow), ID 640850 (Enterprise Manager), and INSTALLER-2879 (Traffix SDC) to this vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H73705133 on the **Diagnostics** > **Identified** > **Medium** page. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table. Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature ---|---|---|---|--- BIG-IP LTM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 11.2.1 | 13.1.0 12.1.3 | Medium | Bash BIG-IP AAM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 | 13.1.0 12.1.3 | Medium | Bash BIG-IP AFM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 | 13.1.0 12.1.3 | Medium | Bash BIG-IP Analytics | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 11.2.1 | 13.1.0 12.1.3 | Medium | Bash BIG-IP APM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 11.2.1 | 13.1.0 12.1.3 | Medium | Bash BIG-IP ASM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 11.2.1 | 13.1.0 12.1.3 | Medium | Bash BIG-IP DNS | 13.0.0 12.0.0 - 12.1.2 | 13.1.0 12.1.3 | Medium | Bash BIG-IP Edge Gateway | 11.2.1 | None | Medium | Bash BIG-IP GTM | 11.4.0 - 11.6.2 11.2.1 | None | Medium | Bash BIG-IP Link Controller | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 11.2.1 | 13.1.0 12.1.3 | Medium | Bash BIG-IP PEM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.6.2 | 13.1.0 12.1.3 | Medium | Bash BIG-IP PSM | 11.4.0 - 11.4.1 | None | Medium | Bash BIG-IP WebAccelerator | 11.2.1 | None | Medium | Bash BIG-IP WebSafe | 13.0.0 12.0.0 - 12.1.2 11.6.0 - 11.6.2 | 13.1.0 12.1.3 | Medium | Bash ARX | None | 6.2.0 - 6.4.0 | Not vulnerable1 | None Enterprise Manager | 3.1.1 | None | Medium | Bash BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Medium | Bash BIG-IQ Device | 4.2.0 - 4.5.0 | None | Medium | Bash BIG-IQ Security | 4.0.0 - 4.5.0 | None | Medium | Bash BIG-IQ ADC | 4.5.0 | None | Medium | Bash BIG-IQ Centralized Management | 5.0.0 - 5.1.0 4.6.0 | None | Medium | Bash BIG-IQ Cloud and Orchestration | 1.0.0 | None | Medium | Bash F5 iWorkflow | 2.0.0 - 2.0.2 | None | Medium | Bash LineRate | None | 2.5.0 - 2.6.1 | Not vulnerable1 | None Traffix SDC | 5.0.0 - 5.1.0 4.0.0 - 4.4.0 | None | Low | Bash 1The specified products contain the affected code. However, F5 identifies the vulnerability status as Not vulnerable because the attacker cannot exploit the code in default, standard, or recommended configurations. If you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>). Mitigation None * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>) * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>) * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>) * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)


Related