F5 Networks BIG-IP : Linux kernel vulnerability (K17241)

low Nessus Plugin ID 85856

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
(CVE-2014-9585)

Impact

When exploited, a local authenticated user may be able to modify some system files or information on an affected F5 system. However, the local authenticated user cannot control which file or information can be modified.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K17241.

See Also

https://my.f5.com/manage/s/article/K17241

Plugin Details

Severity: Low

ID: 85856

File Name: f5_bigip_SOL17241.nasl

Version: 2.9

Type: local

Published: 9/9/2015

Updated: 11/2/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2014-9585

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_domain_name_system, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/8/2015

Vulnerability Publication Date: 1/9/2015

Reference Information

CVE: CVE-2014-9585

BID: 71990