fkie_cve-2018-5510
Vulnerability from fkie_nvd
Published
2018-04-13 13:29
Modified
2024-11-21 04:08
Severity ?
Summary
On F5 BIG-IP 11.5.4 HF4-11.5.5, the Traffic Management Microkernel (TMM) may restart when processing a specific sequence of packets on IPv6 virtual servers.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K77671456 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K77671456 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "06224D59-35F8-4168-80C5-CF5B17E99050", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "2DEE5A79-4588-494B-843B-1FEFC6831D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "F763885B-5C8C-4C88-A439-6CA39A73C150", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "671CFA4C-7CBF-4679-90BD-164DC395B700", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "C8023E4E-0655-42FC-9C11-E71E845238D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "55DB51A2-727F-469D-9C53-7E3EBE7FC56E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "40994EB4-4D31-4697-964D-1F0B09864DF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "BB119C5E-DA90-4BFF-8097-1B2D2832022C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "0F602309-E9D6-497A-B71D-F5C4F912240C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "B38A9213-B17F-4302-B43B-8D7C03A55B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "24AE2A70-4119-4E91-B672-ED7BDA372E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "D0450EF1-FA99-4552-8790-C16A1CC0D486", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "CFE4DB00-433D-414A-A1CE-E507B9BB809B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "B0A850EB-E992-43BA-BFD4-75EFB52BEED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "98A3E730-DDE6-4A3F-96FE-435734055053", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "59D4D2B7-9435-4BC7-8EA2-4B3C860B2D7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "FAA04074-4A58-44F4-9F79-142C64558988", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8D062ED-6A53-4402-A00B-F80722CD6624", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "ADB01A61-1924-417F-8A75-9FDF8F14F754", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "037C39CA-91A7-4027-B709-885E5BEC8927", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "00665FED-D1D2-4B5F-8C23-33FA7E6C65CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "C7975883-83AD-4489-9F0A-6B1B05D7CB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "6DF50E85-8082-46FA-BCA6-F2022E200EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "65E9255A-8437-49DE-810F-C3C42575B884", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA2E88AA-0523-48D0-8664-6AFDBCB6C940", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "E156A41C-0CA9-48B3-91AE-6FCDD428232B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "62C837B4-D6AE-4A13-AB3A-32D832648974", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "8AAEF9BE-8DF1-4D2F-A189-1817E4FB920F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "622CE169-520B-49E2-8E62-DD55B5819110", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "3C77AA08-113B-4DF3-BFCD-61F77574DACA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "274E34BF-82A5-4D9E-BC72-202193A47A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "2B7B314A-80E7-4F6B-9F87-5404D113F909", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "B09BB07E-0A88-4DF2-A2BE-076AAA43D046", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "68460E32-0923-4E2B-A331-8F95787E764B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "D4CE9FA3-B9BD-4641-8891-8F4E255BC364", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AAAE358-497F-4108-821B-AA3604D7308A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "6E38A7F6-B7DB-4F25-95A8-7D1DD6711FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "61E00805-82B4-460B-96E7-465A6CEACD52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "A5D96661-82D2-499C-A022-EA49927E143E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "06E3D246-FC60-4CD6-842D-851FE00F99ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "803AC5D9-561F-4892-8211-7A8832C17930", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "1277379D-D837-494B-ACB5-26176A411360", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EC6A3691-ADC4-44BC-8A11-D855B13EF128", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "4E3E31C5-9E2A-4EC5-96AC-459467760589", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "7BD69BC0-A2E1-4D9B-ABB0-2B29D1223CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "367256F5-2AC5-4347-AF8B-DE5A1A3F7F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "55C39ADA-390B-4422-8EB9-A2781ABE2C76", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "017EEFA5-15CC-45F2-9F47-56194725DFCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "56BAC4C7-AB42-4BBD-98B5-0AE8B032CCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "2405C49B-F25A-4787-8151-8E1CD3678FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "F02E9B5D-AEBD-4457-90C1-7EA3B3144EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "762548E2-682C-4510-BB5D-E38FECB5F8FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "958B911B-D600-4083-988F-8A3B0A4B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DAED537-070D-4600-B6E1-C03D021BB647", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "18CFA52E-F9D7-40C3-9DB5-CDD5767E1F0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "57554B85-BA6F-4A63-B39D-24DB0D4748CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "DDD9C97C-6251-4509-BF6F-F6490489C9B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "AA344EAE-6AE3-4B98-B5F8-ACB258ACEDBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "9573D5EE-933D-4708-BE62-67287C086520", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "72099A8A-CFA4-4D58-859E-C51FE3E07DE7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E3B2FD88-64B9-4B51-BB79-0C075CAA8362", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "7F3469DC-C584-48D0-BF4F-ADF089773123", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "606BA536-C91F-4BC9-9995-597E17140FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "B262FE58-8605-4829-AF57-C01B1B853EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "65DDF3E5-D4A2-4B6F-AE89-078F495D37F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E82D861-4AEC-49B1-9B92-C55109CA000B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_websafe:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "38245250-AE45-456F-9C40-A073AED930C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_websafe:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "79EF3BE3-850D-4056-90AD-11D0E01B0115", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_websafe:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "E96FCB5C-187A-4211-B49D-29EB8BD49DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_websafe:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "B6BF29F7-2817-4639-A79F-36C78D882E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_websafe:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "B7F4CA02-6AE4-486F-B907-82FCB18660CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_websafe:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0F213DE1-45E6-4E93-BEB2-ED555AE0D0CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF96ADCB-2D07-4951-BEB9-B333EBCEC740", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4:hf1:*:*:*:*:*:*", "matchCriteriaId": "7ECB49F7-C55C-46FE-8E15-9B8F6AC8E1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4:hf2:*:*:*:*:*:*", "matchCriteriaId": "E545466A-FC7C-446D-9C34-2BFAF7ED53A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4:hf3:*:*:*:*:*:*", "matchCriteriaId": "36C0AA59-F8B0-40AB-9AD7-428384DF5073", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4:hf4:*:*:*:*:*:*", "matchCriteriaId": "5891C619-B2D7-4943-BDA7-B5F17614A211", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "80DC1E3D-A1F5-4587-AB2C-65201D9864C5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On F5 BIG-IP 11.5.4 HF4-11.5.5, the Traffic Management Microkernel (TMM) may restart when processing a specific sequence of packets on IPv6 virtual servers." }, { "lang": "es", "value": "En F5 BIG-IP, en su versi\u00f3n 11.5.4 HF4-11.5.5, el TMM (Traffic Management Microkernel) podr\u00eda reiniciarse al procesar una secuencia determinada de paquetes en los servidores virtuales IPv6." } ], "id": "CVE-2018-5510", "lastModified": "2024-11-21T04:08:57.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-13T13:29:00.800", "references": [ { "source": "f5sirt@f5.com", "tags": [ "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K77671456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K77671456" } ], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.