ID

VAR-201712-0674


CVE

CVE-2017-6135


TITLE

plural F5 BIG-IP Resource management vulnerabilities in product software

Trust: 0.8

sources: JVNDB: JVNDB-2017-011578

DESCRIPTION

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0, a slow memory leak as a result of undisclosed IPv4 or IPv6 packets sent to BIG-IP management port or self IP addresses may lead to out of memory (OOM) conditions. plural F5 BIG-IP There is a resource management vulnerability in the product software.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a denial-of-service vulnerability. Exploiting this issue allows remote attackers to cause a denial-of-service condition due to excessive memory consumption. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. An attacker could exploit this vulnerability to cause a denial of service (BIG-IP memory resource exhaustion) with maliciously crafted network traffic. The following products and versions are affected: F5 BIG-IP LTM version 13.0.0; BIG-IP AAM version 13.0.0; BIG-IP AFM version 13.0.0; BIG-IP Analytics version 13.0.0; BIG-IP APM 13.0. 0 version; BIG-IP ASM version 13.0.0; BIG-IP DNS version 13.0.0; BIG-IP GTM version 13.0.0; BIG-IP Link Controller version 13.0.0; BIG-IP PEM version 13.0.0; -IP WebSafe version 13.0.0

Trust: 1.98

sources: NVD: CVE-2017-6135 // JVNDB: JVNDB-2017-011578 // BID: 106190 // VULHUB: VHN-114338

AFFECTED PRODUCTS

vendor:f5model:big-ip advanced firewall managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip analyticsscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip application acceleration managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip application security managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip global traffic managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip link controllerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip local traffic managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip policy enforcement managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip websafescope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip access policy managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip dnsscope:eqversion:13.0.0

Trust: 1.6

vendor:f5model:big-ip domain name systemscope:eqversion:13.0.0

Trust: 0.8

vendor:f5model:big-ip websafescope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:13.0.0

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:13.1

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:13.0.1

Trust: 0.3

sources: BID: 106190 // JVNDB: JVNDB-2017-011578 // CNNVD: CNNVD-201702-785 // NVD: CVE-2017-6135

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6135
value: HIGH

Trust: 1.0

NVD: CVE-2017-6135
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-785
value: HIGH

Trust: 0.6

VULHUB: VHN-114338
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6135
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114338
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6135
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114338 // JVNDB: JVNDB-2017-011578 // CNNVD: CNNVD-201702-785 // NVD: CVE-2017-6135

PROBLEMTYPE DATA

problemtype:CWE-772

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-114338 // JVNDB: JVNDB-2017-011578 // NVD: CVE-2017-6135

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-785

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201702-785

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011578

PATCH

title:K43322910url:https://support.f5.com/csp/article/K43322910

Trust: 0.8

title:Multiple F5 Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99652

Trust: 0.6

sources: JVNDB: JVNDB-2017-011578 // CNNVD: CNNVD-201702-785

EXTERNAL IDS

db:NVDid:CVE-2017-6135

Trust: 2.8

db:SECTRACKid:1040050

Trust: 1.7

db:JVNDBid:JVNDB-2017-011578

Trust: 0.8

db:CNNVDid:CNNVD-201702-785

Trust: 0.7

db:BIDid:106190

Trust: 0.3

db:VULHUBid:VHN-114338

Trust: 0.1

sources: VULHUB: VHN-114338 // BID: 106190 // JVNDB: JVNDB-2017-011578 // CNNVD: CNNVD-201702-785 // NVD: CVE-2017-6135

REFERENCES

url:https://support.f5.com/csp/article/k43322910

Trust: 2.0

url:http://www.securitytracker.com/id/1040050

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6135

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6135

Trust: 0.8

url:http://www.f5.com/products/big-ip/

Trust: 0.3

sources: VULHUB: VHN-114338 // BID: 106190 // JVNDB: JVNDB-2017-011578 // CNNVD: CNNVD-201702-785 // NVD: CVE-2017-6135

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 106190

SOURCES

db:VULHUBid:VHN-114338
db:BIDid:106190
db:JVNDBid:JVNDB-2017-011578
db:CNNVDid:CNNVD-201702-785
db:NVDid:CVE-2017-6135

LAST UPDATE DATE

2024-11-23T22:48:52.474000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114338date:2019-10-03T00:00:00
db:BIDid:106190date:2018-06-10T00:00:00
db:JVNDBid:JVNDB-2017-011578date:2018-01-22T00:00:00
db:CNNVDid:CNNVD-201702-785date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6135date:2024-11-21T03:29:07.093

SOURCES RELEASE DATE

db:VULHUBid:VHN-114338date:2017-12-21T00:00:00
db:BIDid:106190date:2018-06-10T00:00:00
db:JVNDBid:JVNDB-2017-011578date:2018-01-22T00:00:00
db:CNNVDid:CNNVD-201702-785date:2017-02-23T00:00:00
db:NVDid:CVE-2017-6135date:2017-12-21T17:29:00.450