logo
DATABASE RESOURCES PRICING ABOUT US

tcpdump vulnerabilities CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925, and CVE-2016-7927

Description

F5 Product Development has assigned ID 644904 (BIG-IP), ID 648098 (BIG-IQ), ID 644072 (Enterprise Manager), and ID 648898 (F5 iWorkflow) to this vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H77384526 on the **Diagnostics** > **Identified** > **High** screen. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature ---|---|---|---|--- BIG-IP LTM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 11.2.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP AAM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP AFM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP Analytics | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 11.2.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP APM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 11.2.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP ASM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 11.2.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP DNS | 13.0.0 12.0.0 - 12.1.2 | 13.1.0 12.1.3 | High | tcpdump BIG-IP Edge Gateway | 11.2.1 | None | High | tcpdump BIG-IP GTM | 11.4.0 - 11.5.5 11.6.1 11.2.1 | 11.6.2 11.5.6 | High | tcpdump BIG-IP Link Controller | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 11.2.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP PEM | 13.0.0 12.0.0 - 12.1.2 11.4.0 - 11.5.5 11.6.1 | 13.1.0 12.1.3 11.6.2 11.5.6 | High | tcpdump BIG-IP PSM | 11.4.0 - 11.4.1 | None | High | tcpdump BIG-IP WebAccelerator | 11.2.1 | None | High | tcpdump BIG-IP WebSafe | 13.0.0 12.0.0 - 12.1.2 11.6.0 - 11.6.1 | 13.1.0 12.1.3 11.6.2 | High | tcpdump ARX | None | 6.2.0 - 6.4.0 | Not vulnerable | None Enterprise Manager | 3.1.1 | None | Medium | tcpdump BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | High | tcpdump BIG-IQ Device | 4.2.0 - 4.5.0 | None | High | tcpdump BIG-IQ Security | 4.0.0 - 4.5.0 | None | High | tcpdump BIG-IQ ADC | 4.5.0 | None | High | tcpdump BIG-IQ Centralized Management | 5.0.0 - 5.3.0 4.6.0 | None | High | tcpdump BIG-IQ Cloud and Orchestration | 1.0.0 | None | High | tcpdump F5 iWorkflow | 2.0.0 - 2.3.0 | None | High | tcpdump LineRate | None | 2.5.0 - 2.6.2 | Not vulnerable | None Traffix SDC | None | 5.0.0 - 5.1.0 4.0.0 - 4.4.0 | Not vulnerable | None If you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>). Mitigation To mitigate this vulnerability, you can invoke the **-w** option in your **tcpdump **syntax to write raw packets to a **pcap **file for offline examination. For more information, refer to [K411: Overview of packet tracing with the tcpdump utility](<https://support.f5.com/csp/article/K411>). **Impact of action:** Depending on the method used to gather the packet capture and the amount of active traffic at the time the capture is taken, the capture file size can increase quickly. For more information, refer to [K6546: Recommended methods and limitations for running tcpdump on a BIG-IP system](<https://support.f5.com/csp/article/K6546>). * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>) * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>) * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>) * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)


Related