SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   F5 BIG-IP Vendors:   F5 Networks
F5 BIG-IP Packet Processing Flaw in the Traffic Management Microkernel Lets Remote Users Deny Service
SecurityTracker Alert ID:  1036624
SecurityTracker URL:  http://securitytracker.com/id/1036624
CVE Reference:   CVE-2016-5023   (Links to External Site)
Updated:  Aug 24 2016
Original Entry Date:  Aug 15 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in F5 BIG-IP. A remote user can cause denial of service conditions on the target system.

A remote user can send specially crafted network traffic to cause the target Traffic Management Microkernel (TMM) to restart, temporarily failing to process traffic.

Virtual servers configured with TCP profiles are affected.

The vendor has assigned ID 572495 to this vulnerability.

Impact:   A remote user can cause the target TMM to restart.
Solution:   The vendor has issued a fix.

[Editor's note: On August 19, 2016, the vendor updated their advisory to retract a previously recommended mitigation for versions 11.3.0 - 11.5.4 regarding the tm.tcpprogressive db variable.]

The vendor advisory is available at:

https://support.f5.com/kb/en-us/solutions/public/k/19/sol19784568.html

Vendor URL:  support.f5.com/kb/en-us/solutions/public/k/19/sol19784568.html (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC