F5 Networks BIG-IP : GNU C library strxfrm/strcoll overflow vulnerabilities (K16416)

medium Nessus Plugin ID 125683

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The GNU C (glibc) strxfrm() function is prone to a remote integer-overflow vulnerability that leads to buffer overflow vulnerability.

The GNU C (glibc) strcoll() function is prone to a stack-based buffer-overflow vulnerability.

Impact

A locally authenticated attacker could run code that exposes the security flaws in glibc. The BIG-IP code contains the vulnerable functions; however, the functions are not used in a manner that exposes the vulnerabilities in the default configuration.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K16416.

See Also

https://support.f5.com/csp/article/K16416

Plugin Details

Severity: Medium

ID: 125683

File Name: f5_bigip_SOL16416.nasl

Version: 1.1

Type: local

Published: 6/4/2019

Updated: 6/4/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Patch Publication Date: 7/23/2015

Vulnerability Publication Date: 7/23/2015