An F5 Networks bug, known as Ticketbleed, was recently discovered. Ticketbleed apparently caused uninitialized...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
memory, including session IDs, to leak from certain F5 products. What are session IDs, and how can attackers use them?
A session ID is a piece of data that keeps track of what a user does when he visits a website for a certain duration of time or for a session. It can be stored as a cookie, form field or URL.
With Ticketbleed, up to 31 bytes of uninitialized memory may leak from, for example, an F5 virtual server configured with a client SSL profile that has the session ticket enabled to speed up resumed and repeated connections.
Before the leakage can occur, the user supplies a session ID together with the ticket to the server. The server, in turn, echoes back that the ticket has been accepted.
At the same time, the F5 stack echoes back 32 bytes of memory, even if the session ID was shorter. This means the attackers can provide a one byte session ID, and then get back 31 bytes of uninitialized memory.
The attackers taking advantage of Ticketbleed can obtain session IDs from other sessions. It is possible for them to get other data from uninitialized memory and cookies.
Disabling cookies is not always practical. A better option is to take the following five steps to disable the session ticket feature, protecting your systems from Ticketbleed:
- Log in to the configuration utility.
- Navigate to the client via local traffic, then to profiles and SSL.
- Toggle the option for configuration from basic to advanced.
- Uncheck session ticket to disable the feature.
- Click update to save the changes.
However, the downside of this fix is that disabling session tickets may cause the connection performance to degrade. Enterprises should keep this in mind when considering their options for addressing session ID security issues like Ticketbleed.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Learn about Bloom filters on cookies and what they mean for privacy
Find out why session cookies should be protected by a salted hash
Discover the effect the Yahoo breach has had on authentication cookies
Dig Deeper on Endpoint protection and client security
Related Q&A from Judith Myerson
A patch was issued for the Dirty COW vulnerability, but researchers later discovered problems with the patch. Expert Judith Myerson explains what ...continue reading
Getting firewall settings right is one of the most basic ways to protect enterprise data from accidental exposures. Expert Judith Myerson discusses ...continue reading
Expert Judith Myerson explains how IP theft can happen despite the cryptographic protections in IEEE standard P1735, as well as what can be done to ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.