F5 Networks BIG-IP : Expat vulnerability (K52320548)

critical Nessus Plugin ID 103313

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.(CVE-2016-0718)

Impact

A remote attacker could send specially crafted XML which, when parsed by an application using the Expat library, would cause that application to stop responding orpossiblyrun arbitrary code with the permission of the user running the application.

BIG-IP ASM control plane

An authenticated user with the relevant privileges, such as Web Application Security Editor,can exploit the vulnerability and gain full control of the system.

big3d/gtmd

The big3d / gtmd processes may be exposed to this vulnerability over the management port and self IP addresses when the Port Lockdown setting is set to Default , All , or Custom with TCP port 4353 included. The impact for the big3d process is a temporary disruption in the communicationbetween peer systems until the system automatically restarts the big3d process.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K52320548.

See Also

https://support.f5.com/csp/article/K52320548

Plugin Details

Severity: Critical

ID: 103313

File Name: f5_bigip_SOL52320548.nasl

Version: 3.9

Type: local

Published: 9/19/2017

Updated: 1/4/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 9/18/2017

Reference Information

CVE: CVE-2016-0718