Description
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of ‘\0’ characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions. (CVE-2014-3508)
Impact
Applications may be affected if they use pretty printing to echo output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.
Status
F5 Product Development has assigned ID 474757 (LineRate) and ID 410742 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.
To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:
Product | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature |
---|---|---|---|
BIG-IP LTM | None | ||
11.0.0 - 11.6.0 | |||
10.0.0 - 10.2.4 | |||
None | |||
BIG-IP AAM | None | 11.4.0 - 11.6.0 | None |
BIG-IP AFM | None | 11.3.0 - 11.6.0 | None |
BIG-IP Analytics | None | 11.0.0 - 11.6.0 | None |
BIG-IP APM | None | 11.0.0 - 11.6.0 | |
10.1.0 - 10.2.4 | None | ||
BIG-IP ASM | None | 11.0.0 - 11.6.0 | |
10.0.0 - 10.2.4 | None | ||
BIG-IP Edge Gateway | |||
None | 11.0.0 - 11.3.0 | ||
10.1.0 - 10.2.4 | None | ||
BIG-IP GTM | None | 11.0.0 - 11.6.0 | |
10.0.0 - 10.2.4 | None | ||
BIG-IP Link Controller | None | ||
11.0.0 - 11.6.0 | |||
10.0.0 - 10.2.4 | |||
None | |||
BIG-IP PEM | None | ||
11.3.0 - 11.6.0 | |||
None | |||
BIG-IP PSM | None | 11.0.0 - 11.4.1 | |
10.0.0 - 10.2.4 | None | ||
BIG-IP WebAccelerator | None | 11.0.0 - 11.3.0 | |
10.0.0 - 10.2.4 | None | ||
BIG-IP WOM | None | 11.0.0 - 11.3.0 | |
10.0.0 - 10.2.4 | None | ||
ARX | 6.0.0 - 6.4.0 | None | |
Configuration utility |
Enterprise Manager| None| 3.0.0 - 3.1.1
2.1.0 - 2.3.0| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0| None
BIG-IQ Cloud| None
| 4.0.0 - 4.5.0
| None
BIG-IQ Device| None
| 4.2.0 - 4.5.0
| None
BIG-IQ Security| None
| 4.0.0 - 4.5.0
| None
BIG-IQ ADC| None| 4.5.0| None
LineRate| 2.4.0
2.3.0 - 2.3.1
2.2.0 - 2.2.4| 2.4.1
2.3.2
2.2.5| Command-line interface
BIG-IP Edge Clients for Android| None
| 2.0.0 - 2.0.5| None
BIG-IP Edge Clients for Apple iOS| None
| 2.0.0 - 2.0.2
1.0.5 - 1.0.6| None
BIG-IP Edge Clients for Linux| None
| 6035.* - 7110.*| None
BIG-IP Edge Clients for MAC OS X| None
| 6035.* - 7110.*
| None
BIG-IP Edge Clients for Windows| None| 6035.* - 7110.*
| None
BIG-IP Edge Portal for Android| None| 1.0.0 - 1.0.2| None
BIG-IP Edge Portal for Apple iOS| None| 1.0.0 - 1.0.3| None
Recommended Action
If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.
F5 is responding to this vulnerability as determined by the parameters defined in K4602: Overview of the F5 security vulnerability response policy.
Supplemental Information