Lucene search

K
f5F5F5:K21284031
HistorySep 01, 2016 - 12:00 a.m.

K21284031 : GnuPG vulnerability CVE-2014-4617

2016-09-0100:00:00
my.f5.com
12

AI Score

5.8

Confidence

High

EPSS

0.013

Percentile

86.0%

Security Advisory Description

The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. (CVE-2014-4617)

Impact

ARX

This vulnerability is exposed when using the Auto Diagnostics feature.

BIG-IP

GNU Privacy Guard (GnuPG) is not used in traffic processing. GnuPG is used only in administrative functions on the BIG-IP system, such as encryption of user configuration set (UCS) and single configuration files (SCF), and verification of ISOs and ASM signatures, which are not affected by this vulnerability. An authenticated (root) user with advanced shell access could upload a specially crafted file and execute** gpg** manually to trigger this vulnerability.

F5 iWorkflow, BIG-IQ, and Enterprise Manager

An authenticated user with advanced shell access could be able to exploit this vulnerability by executing** gpg** manually.