Lucene search

K
f5F5F5:K9990
HistoryMar 24, 2013 - 12:00 a.m.

K9990 : icclib vulnerabilities CVE-2009-0583 and CVE-2009-0584

2013-03-2400:00:00
my.f5.com
20

7.5 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

81.8%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to SOL4602: Overview of F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 10.0.0 9.x
10.0.1
10.1.x
10.2.x
11.x

BIG-IP GTM| 10.0.0| 9.x
10.0.1
10.1.x
10.2.x
11.x
BIG-IP ASM| 10.0.0 | 9.x
10.0.1
10.1.x
10.2.x
11.x
BIG-IP Link Controller| 10.0.0 | 9.x
10.0.1
10.1.x
10.2.x
11.x
BIG-IP WebAccelerator| 10.0.0 | 9.x
10.0.1
10.1.0
10.2.x
11.x
BIG-IP PSM| 10.0.0 | 9.x
10.0.1
10.1.x
10.2.x
11.x
BIG-IP WAN Optimization| 10.0.0 | 10.0.1
10.1.x
10.2.x
11.x
BIG-IP APM| None| 10.1.x
10.2.x
11.x
BIG-IP Edge Gateway| None| 10.1.x
10.2.x
11.x
BIG-IP Analytics| None| 11.x
BIG-IP AFM| None| 11.x
BIG-IP PEM
| None| 11.x
FirePass| None| 5.x
6.x
7.x
Enterprise Manager| None| 1.x
2.x
3.x

ARX| None | 2.x
3.x
4.x
5.x
6.x

Description

Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript’s International Color Consortium Format library (icclib). Using specially-crafted ICC profiles, an attacker could create a malicious PostScript or PDF file with embedded images which could cause Ghostscript to crash or, potentially, execute arbitrary code when opened by the victim.

Information about this advisory is available at the following locations:

Note: These links take you to a resource outside of AskF5, and it is possible that the documents may be removed without our knowledge.

<https://vulners.com/cve/CVE-2009-0583&gt;

<https://vulners.com/cve/CVE-2009-0584&gt;

F5 Product Development tracked this issue as CR118548 and CR119796 and it was fixed in BIG-IP 9.4.7 and 10.0.1. For more information about upgrading, refer to the BIG-IP LTM, ASM, GTM, Link Controller, PSM, or WebAccelerator release notes.

Additionally, this issue was fixed in BIGIP-10.0.0-5514.0-HF2 for BIG-IP 10.0.0. You may download this hotfix or later versions of the hotfix from the F5 Downloads site.

To view a list of the latest available hotfixes, refer to K9502: BIG-IP hotfix matrix.

For information about installing a hotfix, refer to K10025: Managing BIG-IP product hotfixes (10.x).

For information about the F5 hotfix policy, refer to K4918: Overview of F5 critical issue hotfix policy.

7.5 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

81.8%