That's what I heard too, Chris. <div><br></div><div>Anyway, here is the official from F5:</div><div><br></div><div><a href="https://devcentral.f5.com/articles/cve-2014-6271-shellshocked">https://devcentral.f5.com/articles/cve-2014-6271-shellshocked</a></div><div><br></div><div><a href="http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html">http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html</a></div><div><br></div><div>regards,</div><div>Andy<br><br>On Saturday, September 27, 2014, Chris Barnes <<a href="mailto:chris.p.barnes@gmail.com">chris.p.barnes@gmail.com</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p dir="ltr">Do you have anymore info on this?</p>
<p dir="ltr">The integrator who supports my F5s told me only the management interface is vulnerable, public facing interfaces aren't.</p>
<p dir="ltr">Not entirely convinced.<br></p>
<p dir="ltr">-- <br>
Kind Regards,</p>
<p dir="ltr">Christopher Barnes</p>
<p dir="ltr">e. <a href="javascript:_e(%7B%7D,'cvml','chris.p.barnes@gmail.com');" target="_blank">chris.p.barnes@gmail.com</a></p>
<div class="gmail_quote">On 27/09/2014 12:25 PM, "Noel Butler" <<a href="javascript:_e(%7B%7D,'cvml','noel.butler@ausics.net');" target="_blank">noel.butler@ausics.net</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">F5's BIG-IP 11.6.0 also vulnerable<br>
<br>
<br>
______________________________<u></u>_________________<br>
AusNOG mailing list<br>
<a href="javascript:_e(%7B%7D,'cvml','AusNOG@lists.ausnog.net');" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/<u></u>mailman/listinfo/ausnog</a><br>
</blockquote></div>
</blockquote></div>