ID

VAR-201712-0668


CVE

CVE-2017-6138


TITLE

plural F5 BIG-IP Vulnerability related to input validation in product software

Trust: 0.8

sources: JVNDB: JVNDB-2017-011580

DESCRIPTION

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with BIG-IP APM profiles, regardless of settings. The issue is also exposed with the non-default "normalize URI" configuration options used in iRules and/or BIG-IP LTM policies. plural F5 BIG-IP There is an input validation vulnerability in the product software.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. Security flaws exist in several F5 products. An attacker can exploit this vulnerability by sending malicious requests to cause a denial of service (TMM restart). The following products and versions are affected: F5 BIG-IP LTM Release 13.0.0, Release 12.1.0 to Release 12.1.2; BIG-IP AAM Release 13.0.0, Release 12.1.0 to Release 12.1.2; BIG-IP AFM Version 13.0.0, version 12.1.0 to version 12.1.2; BIG-IP Analytics version 13.0.0, version 12.1.0 to version 12.1.2; BIG-IP APM version 13.0.0, version 12.1.0 to 12.1. 2 version; BIG-IP ASM version 13.0.0, version 12.1.0 to 12.1.2; BIG-IP DNS version 13.0.0, version 12.1.0 to 12.1.2; BIG-IP GTM version 13.0.0, Version 12.1.0 through Version 12.1.2; BIG-IP Link Controller Version 13.0.0, Version 12.1.0 through Version 12.1.2; BIG-IP PEM; BIG-IP WebSafe Version 13.0.0, Version 12.1.0 through 12.1 .2 version

Trust: 1.71

sources: NVD: CVE-2017-6138 // JVNDB: JVNDB-2017-011580 // VULHUB: VHN-114341

AFFECTED PRODUCTS

vendor:f5model:big-ip access policy managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip application security managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip link controllerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip local traffic managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip policy enforcement managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip websafescope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip advanced firewall managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip analyticsscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip application acceleration managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip global traffic managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip dnsscope:eqversion:13.0.0

Trust: 1.6

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip dnsscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip websafescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip dnsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip websafescope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip analyticsscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip domain name systemscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip domain name systemscope:eqversion:13.0.0

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip link controllerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip websafescope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip link controllerscope:eqversion:12.1.1

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:12.1.1

Trust: 0.6

vendor:f5model:big-ip access policy managerscope:eqversion:12.1.1

Trust: 0.6

sources: JVNDB: JVNDB-2017-011580 // CNNVD: CNNVD-201702-782 // NVD: CVE-2017-6138

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6138
value: HIGH

Trust: 1.0

NVD: CVE-2017-6138
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-782
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114341
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6138
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114341
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6138
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114341 // JVNDB: JVNDB-2017-011580 // CNNVD: CNNVD-201702-782 // NVD: CVE-2017-6138

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-114341 // JVNDB: JVNDB-2017-011580 // NVD: CVE-2017-6138

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-782

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201702-782

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011580

PATCH

title:K34514540url:https://support.f5.com/csp/article/K34514540

Trust: 0.8

sources: JVNDB: JVNDB-2017-011580

EXTERNAL IDS

db:NVDid:CVE-2017-6138

Trust: 2.5

db:SECTRACKid:1040051

Trust: 1.1

db:JVNDBid:JVNDB-2017-011580

Trust: 0.8

db:CNNVDid:CNNVD-201702-782

Trust: 0.7

db:VULHUBid:VHN-114341

Trust: 0.1

sources: VULHUB: VHN-114341 // JVNDB: JVNDB-2017-011580 // CNNVD: CNNVD-201702-782 // NVD: CVE-2017-6138

REFERENCES

url:https://support.f5.com/csp/article/k34514540

Trust: 1.7

url:http://www.securitytracker.com/id/1040051

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6138

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6138

Trust: 0.8

sources: VULHUB: VHN-114341 // JVNDB: JVNDB-2017-011580 // CNNVD: CNNVD-201702-782 // NVD: CVE-2017-6138

SOURCES

db:VULHUBid:VHN-114341
db:JVNDBid:JVNDB-2017-011580
db:CNNVDid:CNNVD-201702-782
db:NVDid:CVE-2017-6138

LAST UPDATE DATE

2024-11-23T22:22:20.333000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114341date:2018-01-05T00:00:00
db:JVNDBid:JVNDB-2017-011580date:2018-01-22T00:00:00
db:CNNVDid:CNNVD-201702-782date:2017-12-25T00:00:00
db:NVDid:CVE-2017-6138date:2024-11-21T03:29:07.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-114341date:2017-12-21T00:00:00
db:JVNDBid:JVNDB-2017-011580date:2018-01-22T00:00:00
db:CNNVDid:CNNVD-201702-782date:2017-02-23T00:00:00
db:NVDid:CVE-2017-6138date:2017-12-21T17:29:00.527