ID

VAR-201601-0396


CVE

CVE-2015-8098


TITLE

F5 BIG-IP APM Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-006772

DESCRIPTION

F5 BIG-IP APM 11.4.1 before 11.4.1 HF9, 11.5.x before 11.5.3, and 11.6.0 before 11.6.0 HF4 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors related to processing a Citrix Remote Desktop connection through a virtual server configured with a remote desktop profile, aka an "Out-of-bounds memory vulnerability.". F5 BIG-IP APM There is a service disruption (DoS) Vulnerabilities exist that could be put into a state or execute arbitrary code. F5 BIG-IP APM is prone to a memory-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks. The following versions are affected: F5 BIG-IP APM 11.4.1 prior to HF9, 11.4.1 prior to 11.5.3, 11.6.0 prior to 11.6.0 HF4

Trust: 1.98

sources: NVD: CVE-2015-8098 // JVNDB: JVNDB-2015-006772 // BID: 80022 // VULHUB: VHN-86059

AFFECTED PRODUCTS

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.3.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.4.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.2.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.1

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.2.1

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.4.1 to 11.4.1 hf8

Trust: 0.8

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.0 to 11.5.2 hf1

Trust: 0.8

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.0 to 11.6.0 hf3

Trust: 0.8

vendor:f5model:big-ip apm hf3scope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip apm hf8scope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:12.0

Trust: 0.3

vendor:f5model:big-ip apm hf6scope:neversion:11.6

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:neversion:11.6

Trust: 0.3

vendor:f5model:big-ip apm hf4scope:neversion:11.6

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip apm hf9scope:neversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.2

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.0

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2.3

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.4.0

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.1

Trust: 0.3

sources: BID: 80022 // JVNDB: JVNDB-2015-006772 // CNNVD: CNNVD-201601-184 // NVD: CVE-2015-8098

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-8098
value: CRITICAL

Trust: 1.0

NVD: CVE-2015-8098
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201601-184
value: CRITICAL

Trust: 0.6

VULHUB: VHN-86059
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-8098
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-86059
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-8098
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-86059 // JVNDB: JVNDB-2015-006772 // CNNVD: CNNVD-201601-184 // NVD: CVE-2015-8098

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-86059 // JVNDB: JVNDB-2015-006772 // NVD: CVE-2015-8098

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-184

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201601-184

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006772

PATCH

title:SOL43552605: Out-of-bounds memory vulnerability with the BIG-IP APM system CVE-2015-8098url:https://support.f5.com/kb/en-us/solutions/public/k/43/sol43552605.html

Trust: 0.8

title:F5 BIG-IP APM Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59536

Trust: 0.6

sources: JVNDB: JVNDB-2015-006772 // CNNVD: CNNVD-201601-184

EXTERNAL IDS

db:NVDid:CVE-2015-8098

Trust: 2.8

db:SECTRACKid:1034609

Trust: 1.7

db:JVNDBid:JVNDB-2015-006772

Trust: 0.8

db:CNNVDid:CNNVD-201601-184

Trust: 0.7

db:BIDid:80022

Trust: 0.4

db:VULHUBid:VHN-86059

Trust: 0.1

sources: VULHUB: VHN-86059 // BID: 80022 // JVNDB: JVNDB-2015-006772 // CNNVD: CNNVD-201601-184 // NVD: CVE-2015-8098

REFERENCES

url:https://support.f5.com/kb/en-us/solutions/public/k/43/sol43552605.html

Trust: 2.0

url:http://www.securitytracker.com/id/1034609

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8098

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8098

Trust: 0.8

url:https://f5.com/

Trust: 0.3

sources: VULHUB: VHN-86059 // BID: 80022 // JVNDB: JVNDB-2015-006772 // CNNVD: CNNVD-201601-184 // NVD: CVE-2015-8098

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 80022

SOURCES

db:VULHUBid:VHN-86059
db:BIDid:80022
db:JVNDBid:JVNDB-2015-006772
db:CNNVDid:CNNVD-201601-184
db:NVDid:CVE-2015-8098

LAST UPDATE DATE

2024-11-23T23:02:38.811000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-86059date:2016-01-15T00:00:00
db:BIDid:80022date:2016-01-07T00:00:00
db:JVNDBid:JVNDB-2015-006772date:2016-01-15T00:00:00
db:CNNVDid:CNNVD-201601-184date:2016-01-13T00:00:00
db:NVDid:CVE-2015-8098date:2024-11-21T02:38:00.730

SOURCES RELEASE DATE

db:VULHUBid:VHN-86059date:2016-01-12T00:00:00
db:BIDid:80022date:2016-01-07T00:00:00
db:JVNDBid:JVNDB-2015-006772date:2016-01-15T00:00:00
db:CNNVDid:CNNVD-201601-184date:2016-01-13T00:00:00
db:NVDid:CVE-2015-8098date:2016-01-12T19:59:08.003