Lucene search

K
saintSAINT CorporationSAINT:319CC7900695797A2098F6A29AF1F547
HistorySep 02, 2014 - 12:00 a.m.

F5 rsync daemon ConfigSync interface cmi module vulnerability

2014-09-0200:00:00
SAINT Corporation
download.saintcorporation.com
26

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.091

Percentile

94.7%

Added: 09/02/2014
CVE: CVE-2014-2927
BID: 69461
OSVDB: 110595

Background

F5 BIG-IP is a suite of security, availability and acceleration products.

Problem

When configured to support failover, multiple BIG-IP products are vulnerable to an unauthenticated rsync access vulnerability that can be leveraged to upload a malicious SSH key and execute arbitrary code with root privileges.

Resolution

Upgrade to a non-vulnerable version, as reported in F5 Security Advisory SOL15235.

References

<http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15236.html&gt;
<http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf&gt;

Limitations

The target must be configured in the high availability/failover mode.

The OpenSSH and rsync clients must be installed on the SAINTexploit host.

Platforms

Linux

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.091

Percentile

94.7%

Related for SAINT:319CC7900695797A2098F6A29AF1F547