Lucene search

K
f5F5F5:K15652
HistoryOct 02, 2014 - 12:00 a.m.

K15652 : SASL vulnerability CVE-2009-0688

2014-10-0200:00:00
my.f5.com
25

AI Score

7.4

Confidence

Low

EPSS

0.407

Percentile

97.3%

Security Advisory Description

Description

Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c. (CVE-2009-0688)

Impact

None. F5 products are not affected by this vulnerability.

Status

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP AAM None 11.4.0 - 11.6.0
None
BIG-IP AFM None 11.3.0 - 11.6.0
None
BIG-IP Analytics None 11.0.0 - 11.6.0
None
BIG-IP APM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP ASM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 None
BIG-IP Edge Gateway
None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
None
BIG-IP GTM None 11.0.0 - 11.6.0
10.1.0 - 10.2.4 None
BIG-IP Link Controller None
11.0.0 - 11.6.0
10.1.0 - 10.2.4
None
BIG-IP PEM None
11.3.0 - 11.6.0
None
BIG-IP PSM None 11.0.0 - 11.4.1
10.1.0 - 10.2.4 None
BIG-IP WebAccelerator None 11.0.0 - 11.3.0
10.1.0 - 10.2.4
None
BIG-IP WOM None 11.0.0 - 11.3.0
10.1.0 - 10.2.4 None
ARX None
6.0.0 - 6.4.0 None

Enterprise Manager| None| 3.0.0 - 3.1.1
2.1.0 - 2.3.0
| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0
| None
BIG-IQ Cloud| None
| 4.0.0 - 4.4.0
| None
BIG-IQ Security| None
| 4.0.0 - 4.4.0
| None
BIG-IQ Device
| None| 4.2.0 - 4.4.0
| None

Recommended Action

None

Supplemental Information