ID

VAR-201712-1082


CVE

CVE-2017-6167


TITLE

plural F5 BIG-IP Product software vulnerabilities related to race conditions

Trust: 0.8

sources: JVNDB: JVNDB-2017-011685

DESCRIPTION

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, race conditions in iControl REST may lead to commands being executed with different privilege levels than expected. plural F5 BIG-IP There is a race condition vulnerability in the product software.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. A race condition vulnerability exists in several F5 products. An attacker can exploit this vulnerability to execute commands with other privileges. The following products and versions are affected: F5 BIG-IP LTM Version 13.0.0 and Version 12.1.0 through Version 12.1.2; BIG-IP AAM Version 13.0.0 and Version 12.1.0 through Version 12.1.2; BIG-IP AFM Version 13.0.0 and 12.1.0 to 12.1.2; BIG-IP Analytics 13.0.0 and 12.1.0 to 12.1.2; BIG-IP APM 13.0.0 and 12.1.0 to 12.1. 2 version; BIG-IP ASM version 13.0.0 and 12.1.0 through 12.1.2; BIG-IP DNS version 13.0.0 and 12.1.0 through 12.1.2; BIG-IP Link Controller version 13.0.0 and 12.1.0 through 12.1.2; BIG-IP PEM version 13.0.0 and 12.1.0 through 12.1.2; BIG-IP WebSafe 13.0.0 and 12.1.0 through 12.1.2; BIG -IQ Centralized Management version 5.2.0 to version 5.3.0

Trust: 1.71

sources: NVD: CVE-2017-6167 // JVNDB: JVNDB-2017-011685 // VULHUB: VHN-114370

AFFECTED PRODUCTS

vendor:f5model:big-ip access policy managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip application security managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip link controllerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip policy enforcement managerscope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip websafescope:eqversion:13.0.0

Trust: 2.4

vendor:f5model:big-ip advanced firewall managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip analyticsscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip application acceleration managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip local traffic managerscope:eqversion:13.0.0

Trust: 1.8

vendor:f5model:big-ip dnsscope:eqversion:13.0.0

Trust: 1.6

vendor:f5model:big-ip link controllerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip dnsscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip websafescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip dnsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip websafescope:lteversion:12.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip analyticsscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip domain name systemscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip domain name systemscope:eqversion:13.0.0

Trust: 0.8

vendor:f5model:big-ip link controllerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip websafescope:eqversion:12.1.0 to 12.1.2

Trust: 0.8

vendor:f5model:big-ip link controllerscope:eqversion:12.1.1

Trust: 0.6

vendor:f5model:big-ip application security managerscope:eqversion:12.1.1

Trust: 0.6

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.1.1

Trust: 0.6

vendor:f5model:big-ip local traffic managerscope:eqversion:12.1.1

Trust: 0.6

sources: JVNDB: JVNDB-2017-011685 // CNNVD: CNNVD-201712-832 // NVD: CVE-2017-6167

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6167
value: HIGH

Trust: 1.0

NVD: CVE-2017-6167
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201712-832
value: HIGH

Trust: 0.6

VULHUB: VHN-114370
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6167
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114370
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6167
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114370 // JVNDB: JVNDB-2017-011685 // CNNVD: CNNVD-201712-832 // NVD: CVE-2017-6167

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

sources: VULHUB: VHN-114370 // JVNDB: JVNDB-2017-011685 // NVD: CVE-2017-6167

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-832

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201712-832

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011685

PATCH

title:K24465120url:https://support.f5.com/csp/article/K24465120

Trust: 0.8

title:Multiple F5 Repair measures for product competition conditionsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77285

Trust: 0.6

sources: JVNDB: JVNDB-2017-011685 // CNNVD: CNNVD-201712-832

EXTERNAL IDS

db:NVDid:CVE-2017-6167

Trust: 2.5

db:SECTRACKid:1040053

Trust: 1.1

db:JVNDBid:JVNDB-2017-011685

Trust: 0.8

db:CNNVDid:CNNVD-201712-832

Trust: 0.7

db:AUSCERTid:ESB-2021.0514

Trust: 0.6

db:VULHUBid:VHN-114370

Trust: 0.1

sources: VULHUB: VHN-114370 // JVNDB: JVNDB-2017-011685 // CNNVD: CNNVD-201712-832 // NVD: CVE-2017-6167

REFERENCES

url:https://support.f5.com/csp/article/k24465120

Trust: 1.1

url:http://www.securitytracker.com/id/1040053

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6167

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6167

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.0514

Trust: 0.6

sources: VULHUB: VHN-114370 // JVNDB: JVNDB-2017-011685 // CNNVD: CNNVD-201712-832 // NVD: CVE-2017-6167

SOURCES

db:VULHUBid:VHN-114370
db:JVNDBid:JVNDB-2017-011685
db:CNNVDid:CNNVD-201712-832
db:NVDid:CVE-2017-6167

LAST UPDATE DATE

2024-11-23T22:20:52.518000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114370date:2018-01-09T00:00:00
db:JVNDBid:JVNDB-2017-011685date:2018-01-24T00:00:00
db:CNNVDid:CNNVD-201712-832date:2021-02-18T00:00:00
db:NVDid:CVE-2017-6167date:2024-11-21T03:29:11.137

SOURCES RELEASE DATE

db:VULHUBid:VHN-114370date:2017-12-21T00:00:00
db:JVNDBid:JVNDB-2017-011685date:2018-01-24T00:00:00
db:CNNVDid:CNNVD-201712-832date:2017-12-22T00:00:00
db:NVDid:CVE-2017-6167date:2017-12-21T17:29:00.717