Lucene search

K
f5F5SOL21531693
HistoryAug 11, 2016 - 12:00 a.m.

SOL21531693 - libssh2 vulnerability CVE-2016-0787

2016-08-1100:00:00
support.f5.com
21

0.005 Low

EPSS

Percentile

77.6%

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To mitigate this vulnerability for BIG-IP systems, you can avoid using SSH/SFTP in thecURL utility, through a custom EAV monitor, through a script, or interactively with the**cURL **utility.

Impact of action: Ensure any changes to your configuration are compatible with your environment.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy