ID

VAR-200507-0195


CVE

CVE-2005-2245


TITLE

F5 BIG-IP Unknown vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200507-132

DESCRIPTION

Unknown vulnerability in F5 BIG-IP 9.0.2 through 9.1 allows attackers to "subvert the authentication of SSL transactions," via unknown attack vectors, possibly involving NATIVE ciphers. F5 BIG-IP is susceptible to an unspecified SSL authentication bypass vulnerability. It is conjectured that if the BIG-IP is configured to authenticate by utilizing certificate-based authentication, attackers may be able to bypass the requested authentication checks. This allows remote attackers to gain access to protected Web sites. Depending on the nature of the protected Web sites, various further attacks may also be possible. Further details are not currently available. This BID will be updated as more information is disclosed. Versions of BIP-IP from 9.0.2 through to 9.1 are affected. F5 BIG-IP is an all-in-one network device integrated with network traffic management, application security management, load balancing and other functions from F5 Corporation of the United States. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: BIG-IP Unspecified SSL Authentication Security Bypass SECUNIA ADVISORY ID: SA16008 VERIFY ADVISORY: http://secunia.com/advisories/16008/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: BIG-IP 9.x http://secunia.com/product/3158/ DESCRIPTION: A vulnerability has been reported in BIG-IP, which potentially can be exploited by malicious people to bypass certain security restrictions. SOLUTION: The vendor has issued a security update for versions 9.0.4, 9.0.5, and 9.1. ftp://ftp.f5.com/Domestic/bigip/bigip9x-hotfix-CR49528/ As a workaround, the vendor recommends temporarily disabling NATIVE ciphers on any clientssl or serverssl profiles that require or request authentication. This may result in a loss of SSL performance. PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: F5 Networks: http://tech.f5.com/home/bigip-next/solutions/security/sol4944.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-2245 // BID: 14215 // VULHUB: VHN-13454 // PACKETSTORM: 38617

AFFECTED PRODUCTS

vendor:f5model:tmosscope:eqversion:9.0.4

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.1

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.0.5

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.0.2

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.0.3

Trust: 1.6

vendor:f5model:big-ipscope:eqversion:9.1

Trust: 0.9

vendor:f5model:big-ipscope:eqversion:9.0.5

Trust: 0.9

vendor:f5model:big-ipscope:eqversion:9.0.4

Trust: 0.9

vendor:f5model:big-ipscope:eqversion:9.0.3

Trust: 0.9

vendor:f5model:big-ipscope:eqversion:9.0.2

Trust: 0.9

sources: BID: 14215 // CNNVD: CNNVD-200507-132 // NVD: CVE-2005-2245

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2245
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200507-132
value: HIGH

Trust: 0.6

VULHUB: VHN-13454
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-2245
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13454
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-13454 // CNNVD: CNNVD-200507-132 // NVD: CVE-2005-2245

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2245

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200507-132

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200507-132

EXTERNAL IDS

db:BIDid:14215

Trust: 2.0

db:SECUNIAid:16008

Trust: 1.8

db:NVDid:CVE-2005-2245

Trust: 1.7

db:SECTRACKid:1014452

Trust: 1.7

db:CNNVDid:CNNVD-200507-132

Trust: 0.6

db:VULHUBid:VHN-13454

Trust: 0.1

db:PACKETSTORMid:38617

Trust: 0.1

sources: VULHUB: VHN-13454 // BID: 14215 // PACKETSTORM: 38617 // CNNVD: CNNVD-200507-132 // NVD: CVE-2005-2245

REFERENCES

url:http://www.securityfocus.com/bid/14215

Trust: 1.7

url:http://securitytracker.com/id?1014452

Trust: 1.7

url:http://secunia.com/advisories/16008

Trust: 1.7

url:http://tech.f5.com/home/bigip-next/solutions/security/sol4944.html

Trust: 1.5

url:http://www.f5.com/f5products/bigip/

Trust: 0.3

url:http://secunia.com/advisories/16008/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/3158/

Trust: 0.1

sources: VULHUB: VHN-13454 // BID: 14215 // PACKETSTORM: 38617 // CNNVD: CNNVD-200507-132 // NVD: CVE-2005-2245

CREDITS

The vendor disclosed this vulnerability.

Trust: 0.9

sources: BID: 14215 // CNNVD: CNNVD-200507-132

SOURCES

db:VULHUBid:VHN-13454
db:BIDid:14215
db:PACKETSTORMid:38617
db:CNNVDid:CNNVD-200507-132
db:NVDid:CVE-2005-2245

LAST UPDATE DATE

2024-11-23T22:54:22.364000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-13454date:2018-10-30T00:00:00
db:BIDid:14215date:2005-07-12T00:00:00
db:CNNVDid:CNNVD-200507-132date:2005-10-20T00:00:00
db:NVDid:CVE-2005-2245date:2024-11-20T23:59:07.317

SOURCES RELEASE DATE

db:VULHUBid:VHN-13454date:2005-07-12T00:00:00
db:BIDid:14215date:2005-07-12T00:00:00
db:PACKETSTORMid:38617date:2005-07-13T06:27:58
db:CNNVDid:CNNVD-200507-132date:2005-07-12T00:00:00
db:NVDid:CVE-2005-2245date:2005-07-12T04:00:00