lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 4 May 2014 18:37:44 +0000
From: Jeff Costlow <>
To: "" <>
Subject: Re: [FD] F5 BIG-IQ authed arbitrary user password change

This issue has been fixed in all releases after BIG-IQ 4.1, including 4.2
and 4.3.
Please see F5¹s technical solution at
BIG-IQ 4.1 was in limited release and customers had already been asked to
No versions of BIG-IP are vulnerable.

Please use for any further reports. This email
address can be found by searching for ³security² at

On Thu, May 1, 2014 at 5:10 PM, Brandon Perry <bperry.volatile () gmail
>Detailed at this blog post (with pics!) is a vulnerability within F5
>A module for this will be uploaded to ExploitHub this evening that will
>change the root users password and log in over SSH.
>Tune in next week for even more F5 fun!
> <>
>-- blog
> <> -- website

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists