fkie_cve-2019-6604
Vulnerability from fkie_nvd
Published
2019-03-28 21:29
Modified
2024-11-21 04:46
Severity ?
Summary
On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3.6, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, hardware systems with a High-Speed Bridge and using non-default Layer 2 forwarding configurations may experience a lockup of the High-Speed Bridge.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K26455071 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K26455071 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "34520974-8346-4012-B191-F9F3B49C9A87", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "0B60D2B3-22C5-49CA-BB8A-7BBFE60CAFB5", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6BB42D3A-71EE-4367-9F65-86404D74E59D", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "1331467F-B278-485E-AD91-7D0643C2F3DB", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "44E8F4B6-ACF1-4F2C-A2A4-DF7382CCE628", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "578794C1-5D60-4413-A713-95B1876344F9", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F90EFF1C-6B26-4419-B7B0-0AE8A34B06A1", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E5011C2D-FBB5-4117-BB97-11DE70117345", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E866C4E5-D739-4352-9B6D-9753B4C78A24", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "D1FDA72E-991D-4451-9C8E-E738F4D12728", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "8DCFA856-8E59-4E79-8B42-103FACA64CC8", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "8B514CBE-2906-4F1A-9A6A-F1CE46F4B1C3", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E5D00EED-F95D-4458-BDC4-3390DE85348B", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "1D91EC11-DD9A-434B-9EB4-14AA0E977D8D", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "292EC144-CBA2-4275-9F70-4ED65A505B39", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "61D9F220-3F5C-4B65-8A79-DE52D3E49DED", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "C277B22C-B578-4B28-8698-0C8503CA6B23", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "6A11E433-943D-4D92-B45E-3FA268094278", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "96AA67E0-3471-4699-87A7-E47DD8E313B8", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BB76D898-4C7C-40E9-8539-E2A1BC7A5A66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "9D5C853A-0A02-4AA9-B819-88FFD070ED48", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "BE9BAC77-AE7B-4E2B-A0B4-C9DBF627DF66", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "D4C3D6F5-D94D-46A3-991C-A11275B59F8E", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "6114B091-1612-4EA2-81D4-2E5455A345F7", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "86D68F26-EF89-4016-BD3A-637951752AAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "CE98010B-7588-4A1C-89FE-72CA9B73C57A", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5CDE9713-5E26-4B55-A4BA-C4239146C4AA", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "57CCB85A-6F90-4DB7-B0F8-AE5250E1DCFE", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "36F60067-2623-42F9-8B4F-C24F3268DDB9", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "ADAD6E9A-F8B5-4B2D-B687-AEAB518B8F19", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "D9927CE2-18D5-49D7-8331-8C97BC4CC87B", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "35D39173-BC06-409F-805F-50874376F148", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "60189636-02D6-44CA-BE2A-7777E3C409CD", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "68E2840B-96F4-4437-91D1-4AFE99E54D6A", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "23E592A7-B530-4932-A81D-D1B9ABD64047", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A35A6B27-EC09-42BD-992A-C47A23A7B7F9", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "70FDA39F-9038-4E1F-8DF3-585565AEFD75", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "2CD4DFE3-9071-4808-AE24-2CCA5DB5BA80", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B83479FA-82FB-4F71-9B98-E683745DB49E", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "8E734E1C-A92F-4394-8F33-4429161BE47C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "C5DD20DA-0199-4D86-BBCB-012C25BB03E1", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "3C3D1516-3B4B-4A9A-AF2A-727C256C3902", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5AD75094-3248-4D37-969E-75272F6F31D6", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "15F4D416-10F4-4C08-A25D-0795F7FE0FBE", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7CF10213-FBE4-47A5-8EF2-B45BF15BEB6D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*", matchCriteriaId: "0BA17099-6682-4033-840D-D45157038F01", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:h:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "FAEDD121-4CFD-434E-8CED-890AECFA32F6", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:h:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "1160D8C7-32E7-4837-AF7B-6F056255B5A2", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:h:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "19BEAC24-16B7-4841-818D-4ECD290F7579", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:h:f5:big-ip_protocol_security_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "FCE3B2B0-66AA-4D12-B50E-8A3525AD74F0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "E5FE59B4-25A2-4EA0-94E4-22FD07AC8C5A", versionEndIncluding: "14.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "52670F46-9438-430A-9D16-1F10655AB7BD", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "E190B2BE-BE2F-41C9-885E-6E0951498EC7", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "1FE1518D-8F83-47E9-B183-A998FA8B7CE2", versionEndIncluding: "12.1.3", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "D6944128-3A30-4835-A125-3EA7571D7DC0", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "9F13AAF2-2AD5-4121-8ABB-919835A46BD6", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "B6893786-8F81-49B3-B66C-910E225029EC", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "79344F94-2CB8-4F08-9373-61614A38476C", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "42D16634-442B-4674-B11E-6748D28764BD", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "622C877B-760A-4C50-9FDF-998C010B864E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EF2A5505-3830-44DE-AE62-DED706A2926B", versionEndIncluding: "11.5.8", versionStartIncluding: "11.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "C3B161B7-21B7-4709-94D1-FBAF196C47A0", versionEndIncluding: "11.6.3", versionStartIncluding: "11.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "397AC4A5-B67C-483B-84F7-8CB294BB460C", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E697E4FD-1882-4BF8-9B9F-FB7DFD19497B", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "80509490-50DA-42F8-8A4A-A6F6B95649BA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3.6, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, hardware systems with a High-Speed Bridge and using non-default Layer 2 forwarding configurations may experience a lockup of the High-Speed Bridge.", }, { lang: "es", value: "En BIG-IP, en versiones 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3.6, 13.0.0-13.1.1.1 y 14.0.0-14.0.0.2, en determinadas circunstancias, los sistemas de hardware con un puente de velocidad alta que utilizan configuraciones de reenvío de la capa 2 no establecidas por defecto podrían experimentar el bloqueo de dicho puente.", }, ], id: "CVE-2019-6604", lastModified: "2024-11-21T04:46:47.310", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-28T21:29:00.663", references: [ { source: "f5sirt@f5.com", tags: [ "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K26455071", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K26455071", }, ], sourceIdentifier: "f5sirt@f5.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.