SOL37236006 - SQLite vulnerabilities CVE-2015-3414 and CVE-2015-3415


Vulnerability Recommended Actions If you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. F5 responds to vulnerabilities in accordance with the **Severity** values published in the previous table. The **Severity** values and other security vulnerability parameters are defined in SOL4602: Overview of the F5 security vulnerability response policy. To mitigate this vulnerability, you should only permit management access to F5 products over a secure network, and limit shell access to trusted users. Supplemental Information * SOL9970: Subscribing to email notifications regarding F5 products * SOL9957: Creating a custom RSS feed to view new and updated documents * SOL4918: Overview of the F5 critical issue hotfix policy

Affected Software

CPE Name Name Version
arx 6.4.0
traffix sdc 4.4.0