Lucene search

K
f5F5F5:K9592
HistoryMar 29, 2013 - 12:00 a.m.

K9592 : bzip2 vulnerability CVE-2008-1372

2013-03-2900:00:00
my.f5.com
11

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.086 Low

EPSS

Percentile

93.9%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.3.0 - 9.3.1
9.4.0 - 9.4.6
9.6.0 - 9.6.1 9.4.7 - 9.4.8
10.x
11.x
BIG-IP GTM 9.3.0 - 9.3.1
9.4.0 - 9.4.6 9.4.7 - 9.4.8
10.x
11.x
BIG-IP ASM 9.3.0 - 9.3.1
9.4.0 - 9.4.6
9.4.7 - 9.4.8
10.x
11.x
BIG-IP Link Controller 9.3.0 - 9.3.1
9.4.0 - 9.4.6 9.4.7 - 9.4.8
10.x
11.x
BIG-IP WebAccelerator 9.4.0 - 9.4.6 9.4.7 - 9.4.8
10.x
11.x
BIG-IP PSM 9.4.5 - 9.4.6 9.4.7 - 9.4.8
10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM None 11.x
FirePass 5.5 - 5.5.2
6.0 - 6.0.3
6.1.0
7.0.0 None
Enterprise Manager 1.2.0 - 1.6.0 1.7.0 - 1.8.0
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x
An attacker inducing an operator to uncompress a crafted archive file using bzip2 could potentially execute arbitrary code.
Information about this advisory is available at the following location:
<https://vulners.com/cve/CVE-2008-1372&gt;
Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.
F5 Product Development tracked this issue as CR114442 and CR107644 for BIG-IP LTM, GTM, ASM, Link Controller, WebAccelerator, PSM, FirePass, and Enterprise Manager, and it was fixed in BIG-IP 9.4.7 and 10.0.0, and in Enterprise Manager 1.7. For information about upgrading, refer to the BIG-IP LTM, ASM, GTM, Link Controller, PSM, WebAccelerator, or Enterprise Manager release notes.
Workaround
The affected versions of BIG-IP LTM, GTM, ASM, Link Controller, WebAccelerator, PSM, and Enterprise Manager have the bzip2 package installed. However, the package is not used and can be safely removed by typing the following command:
rpm -e bzip2
Note: Thebzip2 package cannot be safely removed from the affected versions of FirePass and WANJet products.
The FirePass controller is a closed system with no administrative access to the underlying operating system. Bzip2 is used exclusively for compressing logs, and it poses a low risk of being compromised by this vulnerability.

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.086 Low

EPSS

Percentile

93.9%