CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-6166 F5 BIG-IP ASM TMM FastL4 Profile Denial of Service Vulnerability (K65615624)

2017年12月8日 1197点热度 0人点赞 0条评论

漏洞类别:Local

漏洞等级:

漏洞信息

In BIG-IP ASM, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.

Affected Versions:
BIG-IP ASM 12.0.0 - 12.1.1

QID Detection Logic:
This authenticated QID checks for the vulnerable versions of F5 BIG-IP devices.

漏洞危害

A remote attacker may be able to cause a BIG-IP system to produce a core file, disrupting the flow of traffic and causing a failover to a standby system, if configured. BIG-IP logs will show the notice panic: packet_free: double free! error when TMM crashes.

解决方案

Customers are advised to refer to K65615624 for updates pertaining to this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

K65615624

0daybank

标签: 暂无
最后更新:2017年12月11日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me