Lucene search

K
f5F5SOL30403302
HistoryNov 21, 2016 - 12:00 a.m.

SOL30403302 - ImageMagick vulnerabilities CVE-2015-8895 and CVE-2015-8896

2016-11-2100:00:00
support.f5.com
25

0.016 Low

EPSS

Percentile

87.6%

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

Mitigation

To mitigate this vulnerability, you can disable image optimization for ICON and PICT files by BIG-IP AAM or BIG-IP WebAccelerator policy, or ensure that only trusted ICON or PICT files are processed by controlling access to image files on pool members.

Impact of action: Performing the recommended actions should not have a negative impact on your system.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • The Accelerating Images with Image Optimization chapter of the**BIG-IP Acceleration: Implementations** guide

Note: For information about how to locate F5 product guides, refer to SOL12453464: Finding producct documentation on AskF5.