Lucene search

K
f5F5SOL15278
HistoryJun 19, 2014 - 12:00 a.m.

SOL15278 - SSL renegotiation vulnerability CVE-2011-1473

2014-06-1900:00:00
support.f5.com
160

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.93 High

EPSS

Percentile

98.8%

Vulnerability Recommended Actions

  • BIG-IP 11.x - 12.x
  • BIG-IP 10.x
  • FirePass
  • Enterprise Manager
  • ARX

BIG-IP 11.x - 12.x

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists.

You can mitigate this vulnerability in one of the following ways:

Implementing an iRule

Impact of workaround: iRules may increase processing overhead and require more system resources per connection.

For more information, refer to the SSL Renegotiation DOS attack รขย€ย“ an iRule Countermeasure DevCentral article.

Note: A DevCentral login is required to access this content.

Disabling SSL renegotiation in your SSL profile

Impact of workaround: Individual SSL connections are controlled by BIG-IP system cache timeout if the renegotiation option is disabled and will not be able to stay open in the cache for more than 24 hours.

  1. Log in to the Configuration utility as the admin user.
  2. Navigate to Local Traffic> Profile> SSL.
  3. Select either Clientor Server,****depending on which profile type you want to modify.
  4. Select your SSL profile.
  5. In the Configurationmenu, select Advanced.
  6. For the Renegotiationoption, clear the Enabledcheck box.
  7. To save your changes, click Update.

BIG-IP 10.x

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists.

You can mitigate this vulnerability in one of the following ways:

Implementing an iRule

Impact of workaround: Rules may increase processing overhead and require more system resources per connection.

For more information, refer to the SSL Renegotiation DOS attack รขย€ย“ an iRule Countermeasure DevCentral article.

Note: A DevCentral login is required to access this content.

Disabling SSL renegotiation in your SSL profile

Impact of workaround: Individual SSL connections will not be able to stay open for more than 24 hours.

  1. Log in to the Configuration utility as the admin user.
  2. Navigate to Local Traffic >Profile >** SSL**.
  3. Select either Clientor Server,****depending on which profile type you want to modify.
  4. Select your SSL profile.
  5. In the Configurationmenu, select Advanced.
  6. For the Renegotiationoption, clear the Enabledcheck box.
  7. To save your changes, click** Update**.

FirePass

None

Enterprise Manager

None

ARX

None

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents.
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)
  • SOL10025: Managing BIG-IP product hotfixes (10.x)
  • SOL9502: BIG-IP hotfix matrix
  • SOL10322: FirePass hotfix matrix
  • SOL12766: ARX hotfix matrix
  • SOL3430: Installing FirePass hotfixes
  • SOL6664: Obtaining and installing OPSWAT hotfixes
  • SOL10942: Installing OPSWAT hotfixes on BIG-IP APM systems

References

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.93 High

EPSS

Percentile

98.8%