Lucene search

K
f5F5SOL14609
HistoryAug 15, 2013 - 12:00 a.m.

SOL14609 - OpenSSH vulnerability CVE-2008-5161

2013-08-1500:00:00
support.f5.com
633

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.01 Low

EPSS

Percentile

82.3%

Vulnerability Recommended Actions

To eliminate this vulnerability, upgrade to a version that is listed in the Versions known to be not vulnerable column in the previous table.

Note: BIG-IP and Enterprise Manager systems running fixed versions can be affected when an older OpenSSH client connects to the updated server. If you are using old SSH clients, you should upgrade the clients or manually set those clients’ cipher lists to only include CTR ciphers. For example, to use only CTR ciphers for the OpenSSH client, the command line must include the following option:

-c aes128-ctr,aes192-ctr,aes256-ctr

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)
  • SOL10025: Managing BIG-IP product hotfixes (10.x)
  • SOL6845: Managing BIG-IP product hotfixes (9.x)
  • SOL9502: BIG-IP hotfix matrix

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.01 Low

EPSS

Percentile

82.3%