Lucene search

K
f5F5SOL52439336
HistorySep 06, 2016 - 12:00 a.m.

SOL52439336 - FreeType vulnerabilities CVE-2014-9746 and CVE-2014-9747

2016-09-0600:00:00
support.f5.com
20

0.025 Low

EPSS

Percentile

90.3%

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to SOL21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.

Mitigation

BIG-IP and BIG-IQ

To mitigate this vulnerability for BIG-IP and BIG-IQ systems, you should not alter the default configuration to allow the system to parse fonts from untrusted sources.

ARX

None

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5