my.f5.com
Open in
urlscan Pro
35.158.127.53
Public Scan
Submitted URL: https://support.f5.com/csp/article/K32485746?utm_source=f5support&utm_medium=RSS
Effective URL: https://my.f5.com/manage/s/article/K32485746
Submission: On November 27 via api from HU — Scanned from DE
Effective URL: https://my.f5.com/manage/s/article/K32485746
Submission: On November 27 via api from HU — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>
Text Content
Loading ×Sorry to interrupt CSS Error Refresh Skip to content * ShowF5 SitesMenu * ShowContact F5Menu * ShowFREE TRIALSMenu * Under Attack ? Open navigation menuMyF5 ShowHomeMenu ShowSupportMenu ShowMy Products & PlansMenu ShowResourcesMenu Open SearchSign In ShowHomeMenu ShowSupportMenu ShowMy Products & PlansMenu ShowResourcesMenu * ShowF5 SitesMenu * ShowContact F5Menu * ShowFREE TRIALSMenu * Under Attack ? Security Advisory ARCHIVED - K32485746: OPENSSH VULNERABILITY CVE-2016-10708 Published Date: Apr 11, 2018Updated Date: Jan 8, 2024 * Download Article * Bookmark Article * Show social share buttons AI Recommended Content Toggle showing the products this article Evaluated products: THIS ARTICLE HAS BEEN ARCHIVED AND IS NO LONGER MAINTAINED. SECURITY ADVISORY DESCRIPTION sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c. (CVE-2016-10708) Impact This vulnerability allows a remote attacker to disrupt service. SECURITY ADVISORY STATUS F5 Product Development has assigned ID 712608 (BIG-IP), ID 712649 (BIG-IQ and F5 iWorkflow), ID 712648 (Enterprise Manager), and ID 431179 (ARX) to this vulnerability. Additionally, BIG-IP iHealth may list Heuristic H32485746 on the Diagnostics > Identified > Medium page. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table. ProductBranchVersions known to be vulnerableFixes introduced inSeverityCVSSv3 score1Vulnerable component or featureBIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe)15.xNoneNot applicableMedium5.3OpenSSH14.x14.0.0 - 14.0.114.1.013.x13.1.0 - 13.1.3None12.x12.1.0 - 12.1.5None11.x11.2.1 - 11.6.5NoneARX6.x6.2.0 - 6.4.0NoneMedium5.3OpenSSHEnterprise Manager3.x3.1.1NoneMedium5.3OpenSSHBIG-IQ Centralized Management8.xNone8.0.0Medium5.3OpenSSH7.x7.0.0 - 7.1.0None6.x6.0.0 - 6.1.0None5.x5.0.0 - 5.4.0None4.x4.6.0NoneBIG-IQ Cloud and Orchestration1.x1.0.0NoneMedium5.3OpenSSHF5 iWorkflow2.x2.0.2 - 2.3.0NoneMedium5.3OpenSSHLineRate2.x2.5.0 - 2.6.2NoneMedium5.3OpenSSHTraffix SDC5.x5.0.0 - 5.1.0NoneMedium5.3OpenSSH4.x4.0.5 - 4.4.0None 1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. SECURITY ADVISORY RECOMMENDED ACTIONS If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation None RELATED CONTENT * K51812227: Understanding Security Advisory versioning * K41942608: Overview of Security Advisory articles * K4602: Overview of the F5 security vulnerability response policy * K4918: Overview of the F5 critical issue hotfix policy * K9502: BIG-IP hotfix and point release matrix * K13123: Managing BIG-IP product hotfixes (11.x - 13.x) * K15106: Managing BIG-IQ product hotfixes * K167: Downloading software and firmware from F5 * K9970: Subscribing to email notifications regarding F5 products * K9957: Creating a custom RSS feed to view new and updated documents * K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems AI RECOMMENDED CONTENT * Knowledge - K000135931: Contact F5 Support * Security Advisory - K000148495: libssh vulnerability CVE-2023-1667 * Security Advisory - K05710614: BIG-IP HSB vulnerability CVE-2024-39778 * Known Issue - K000148566: F5 rSeries systems may silently reboot after upgrading to F5OS-A 1.8.0 Return to Top Contact Support Live chat:AskF5 Have a Question? * Support and Sales › Follow Us * * * * * About F5 * Corporate Information * Newsroom * Investor Relations * Careers * Contact Information * Communication Preferences Education * Training * Certification * LearnF5 * Free Online Training F5 Sites * F5.com * DevCentral * MyF5 * Partner Central * F5 Labs Support Tasks * Read Support Policies * Create Support Case * Leave Feedback [+] * About F5 * Corporate Information * Newsroom * Investor Relations * Careers * Contact Information * Communication Preferences * Education * Training * Certification * LearnF5 * Free Online Training * F5 Sites * F5.com * DevCentral * MyF5 * Partner Central * F5 Labs * Support Tasks * Read Support Policies * Create Support Case * Leave Feedback [+] ©2024 F5, Inc. All rights reserved. * Policies * Privacy * Trademarks * California Privacy * Do Not Sell My Personal Information * MyF5 Terms of Use * Cookie-Präferenzen Opens in a modal window Wir respektieren Ihre Privatsphäre Um Ihnen ein optimales Erlebnis bieten zu können, verwenden wir Technologien von Drittanbietern, um die Ihnen angezeigten Inhalte zu personalisieren, und um besser zu verstehen, welche Inhalte für Sie wichtig sind. Weitere Informationen finden Sie in unserer Datenschutzerklärung. Einstellungen ändern Nein, danke Ich bin dabei Loading