fkie_cve-2017-6132
Vulnerability from fkie_nvd
Published
2017-12-21 17:29
Modified
2024-11-21 03:29
Severity ?
Summary
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 13.0.0, 12.0.0 to 12.1.2, 11.6.0 to 11.6.1 and 11.5.0 - 11.5.4, an undisclosed sequence of packets sent to BIG-IP High Availability state mirror listeners (primary and/or secondary IP) may cause TMM to restart.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | http://www.securityfocus.com/bid/102333 | Third Party Advisory, VDB Entry | |
f5sirt@f5.com | http://www.securitytracker.com/id/1040049 | Third Party Advisory, VDB Entry | |
f5sirt@f5.com | https://support.f5.com/csp/article/K12044607 | Issue Tracking, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102333 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040049 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K12044607 | Issue Tracking, Mitigation, Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "2A113DC2-B084-48C2-8ECF-F0281AC34246", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "C1F5FF67-5D17-4760-AFDC-4234EC1E6306", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E5D27D4A-BD5C-4FA9-AA72-F7956298DE06", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "12F86EB5-D581-4103-A802-44D968BA8D55", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "36F383ED-8CB5-400D-BFDB-BD5B8CD8C7AE", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "06224D59-35F8-4168-80C5-CF5B17E99050", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BA7D64DC-7271-4617-BD46-99C8246779CA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "2AC4ECCE-9343-4462-872C-FA4860998B69", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "39E45CF5-C9E4-4AB9-A6D5-66F8336DDB79", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "0E3D8A24-0B8D-432B-8F06-D0E1642E7C1C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "A4489382-0668-4CFB-BA89-D54762937CEE", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "9850D0AA-B173-47B2-9B69-75E6D1FAF490", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "281D0B5B-27DF-4E8A-AFC9-D09468F8ECDF", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "40994EB4-4D31-4697-964D-1F0B09864DF2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "3D75D5AD-C20A-4D94-84E0-E695C9D2A26D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "55D59D80-4DC5-4A84-BF42-A5AC2D39CC7A", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "93212B86-21EA-4340-9149-E58F65285C15", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "3755740D-F1DC-4910-ADDD-9D491515201C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "EA244A7D-F65D-4114-81C8-CE811959EA10", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "5EA9F72C-8344-4370-B511-31BEC8BA63E8", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "96CF015E-C74B-4215-9103-8087BC1D12AB", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "CFE4DB00-433D-414A-A1CE-E507B9BB809B", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "8C4E5F36-434B-48E1-9715-4EEC22FB23D1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "857B3A62-F808-4CA9-BFAD-C133D94CF531", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "25944BCA-3EEB-4396-AC8F-EF58834BC47E", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "A7D226F1-6513-4233-BE20-58D7AB24978F", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "B33B2082-E040-4799-A260-BA687ED8614E", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "A85766A4-2181-4719-ADCF-4FEA0031DB80", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "D2E93EE3-DB73-468E-87CA-4D277F283648", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "ADB01A61-1924-417F-8A75-9FDF8F14F754", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "34D75E7F-B65F-421D-92EE-6B20756019C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "DDE31583-1329-468C-87C9-BBB8FB5132B9", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "0ACC0695-E62E-4748-AA8A-46772EB8C83C", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "1C0312FC-8178-46DE-B4EE-00F2895073BA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "BC6C5628-14FF-4D75-B62E-D4B2707C1E3D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "C9E574F6-34B6-45A6-911D-E5347DA22F69", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "BCF94129-8779-4D68-8DD4-B828CA633746", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "BA2E88AA-0523-48D0-8664-6AFDBCB6C940", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BCF89E7C-806E-4800-BAA9-0225433B6C56", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "C8FF324E-8533-403A-BEA9-617A28033CC8", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "7CB146EF-CCAB-4194-9735-F8909E283308", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "1AD2C1D2-103E-4B0F-84AA-999F01E695F0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "855E91A4-0A0C-4E5C-8019-FB513A793803", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "FCCC2092-E109-4FF6-9B85-6C9434269851", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "8923BB93-96C1-417B-9172-4A81E731EBA2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "274E34BF-82A5-4D9E-BC72-202193A47A5A", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7569977A-E567-4115-B00C-4B0CBA86582E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_dns:*:*:*:*:*:*:*:*", matchCriteriaId: "E097889C-175C-40A6-9DCF-2C03981D9349", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:*:*:*:*:*:*:*:*", matchCriteriaId: "24B9912B-31F0-4265-8D61-0E6D46DA33DB", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E142B175-0E9D-4051-A6B1-FF9E7583DFBA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "9B131043-3C02-47CE-8D1C-BB29A20113E5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "DCE4ACE8-1309-4631-9E34-A6032009B702", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "A70560C5-AEB5-4144-A0AA-10A63527B5C1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "8F2CE884-45CD-4EB8-8568-B3AEAB017361", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "93674162-3A63-4F05-B68F-B7D54B0AAE98", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "80E2E5FE-217F-4267-AEB9-719E376D2FB0", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5EF737FD-7706-4536-912A-C22E0B2FE3C4", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "0594DBC5-8470-416C-A5EA-E04F5AB2C799", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "B50BF19F-71B4-47C0-A96E-6EB90FCC6AE7", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "BD3A3BA6-6F60-45CA-8F52-687B671B077A", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "202B6870-718C-4F8D-9BAB-7ED6385BF2A7", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "EC6A3691-ADC4-44BC-8A11-D855B13EF128", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "3914B25C-4E86-4C00-A199-4C9A99BA2EC4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "48D3CF2B-1D30-461B-836D-A16EAA15F5BC", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "C4A5CD9B-D257-4EC9-8C57-D9552C2FFFFC", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "13E6D2CA-CC4F-4317-A842-4DF0693B0CB6", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "AB017D7A-3290-4EF5-9647-B488771A5F32", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "4F316C54-FAE4-48D8-9E40-ED358C30BF24", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "AC0F5FD3-45E7-4D55-A3AC-6572FC0682D0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "56BAC4C7-AB42-4BBD-98B5-0AE8B032CCC7", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "E2C4414E-8016-48B5-8CC3-F97FF2D85922", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A5AB7A86-4C18-4FCA-90A0-BA9116FF31C3", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "BDE77CCE-7F97-48EA-A9D3-090B1481616F", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "1B6EA0C0-9C26-4A87-98F1-5B317D606ECB", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4D379372-A226-4230-B1F3-04C696518BD8", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "22FAC35D-2803-49B0-9382-F14594B88FC5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "3C72257B-FF99-4707-A0E3-316D538B1CF6", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "18CFA52E-F9D7-40C3-9DB5-CDD5767E1F0D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "42821916-E601-4831-B37B-3202ACF2C562", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", matchCriteriaId: "8552AED4-DC7B-4DA1-AD49-9AD856A69DC1", versionEndIncluding: "11.6.1", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", matchCriteriaId: "57010E5E-5940-4DDA-AD56-D646D54084AA", versionEndIncluding: "12.1.2", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "B45F50EB-D059-4251-AF03-DEC2F306C74C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "50A13328-66C1-4D9D-8E46-754401D5F457", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "E94FCC0F-5505-4123-B3FA-ACB90DDE276E", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "22A30CF4-7D0D-46A6-A2F4-8DC0C1AA4480", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "38245250-AE45-456F-9C40-A073AED930C6", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:13.0.0:*:*:*:*:*:*:*", matchCriteriaId: "B2E56D76-1A89-46AB-9C17-CB24662FFDE7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 13.0.0, 12.0.0 to 12.1.2, 11.6.0 to 11.6.1 and 11.5.0 - 11.5.4, an undisclosed sequence of packets sent to BIG-IP High Availability state mirror listeners (primary and/or secondary IP) may cause TMM to restart.", }, { lang: "es", value: "En F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM y Websafe, en versiones de software 13.0.0, de la 12.0.0 a la 12.1.2, de la 11.6.0 a la 11.6.1 y de la 11.5.0 a la 11.5.4, una secuencia no revelada de paquetes enviada a los mirror listeners de estado de BIG-IP High Availability (IP primaria y/o secundaria) podría hacer que se reinicie TMM.", }, ], id: "CVE-2017-6132", lastModified: "2024-11-21T03:29:06.633", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-12-21T17:29:00.323", references: [ { source: "f5sirt@f5.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102333", }, { source: "f5sirt@f5.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1040049", }, { source: "f5sirt@f5.com", tags: [ "Issue Tracking", "Mitigation", "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K12044607", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102333", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1040049", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mitigation", "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K12044607", }, ], sourceIdentifier: "f5sirt@f5.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.