Lucene search

K
f5F5F5:K9889
HistoryMar 25, 2013 - 12:00 a.m.

K9889 : NTP vulnerability CVE-2009-0021

2013-03-2500:00:00
my.f5.com
4

6.9 Medium

AI Score

Confidence

Low

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.007 Low

EPSS

Percentile

78.9%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM None 9.x
10.x
11.x
BIG-IP GTM None 9.x
10.x
11.x
BIG-IP ASM None 9.x
10.x
11.x
BIG-IP Link Controller None 9.x
10.x
11.x
BIG-IP WebAccelerator None 9.x
10.x
11.x
BIG-IP PSM None 9.x
10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM
None 11.x
FirePass None 5.x
6.x
7.x
Enterprise Manager None 1.x
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

Description

NTP may not properly check the return value from the OpenSSL EVP_VerifyFinal function, which may allow a remote attacker to bypass validation of the certificate chain by way of a malformed SSL/TLS signature for DSA and ECDSA keys.

Note: This is a similar vulnerability to CVE-2008-5077. For information about CVE-2008-5077, refer to K9762: OpenSSL vulnerability - CVE-2008-5077.

Information about this advisory is available at the following location:

Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

<https://vulners.com/cve/CVE-2009-0021&gt;

The FirePass, BIG-IP, and WebAccelerator products listed use a vulnerable version of NTP; however, these products are not subject to this vulnerability because, by default, these products do not use DSA and ECDSA certificates and keys for NTP.

F5 Product Development is tracking a change request to upgrade the NTP version used as CR115608 for FirePass and BIG-IP products.

6.9 Medium

AI Score

Confidence

Low

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.007 Low

EPSS

Percentile

78.9%