ID CVE-2015-5058
Summary Memory leak in the virtual server component in F5 Big-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.5.x before 11.5.1 HF10, 11.5.3 before HF1, and 11.6.0 before HF5, BIG-IQ Cloud, Device, and Security 4.4.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted ICMP packets.
References
Vulnerable Configurations
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_cloud:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_cloud:4.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_device:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_device:4.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:big-iq_security:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:big-iq_security:4.5.0:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 26-08-2015 - 02:54)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
confirm https://support.f5.com/kb/en-us/solutions/public/17000/000/sol17047.html
sectrack 1033334
Last major update 26-08-2015 - 02:54
Published 24-08-2015 - 14:59
Last modified 26-08-2015 - 02:54
Back to Top