SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   F5 BIG-IP Vendors:   F5 Networks
F5 BIG-IP Flaw in Session Ticket Response Lets Remote Users Obtain Potentially Sensitive Information from System Memory
SecurityTracker Alert ID:  1037800
SecurityTracker URL:  http://securitytracker.com/id/1037800
CVE Reference:   CVE-2016-9244   (Links to External Site)
Date:  Feb 9 2017
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 11.4.0 - 11.6.1, 12.0.0 - 12.1.2
Description:   A vulnerability was reported in F5 BIG-IP. A remote user can obtain potentially sensitive information from memory on the target system.

A remote user can send a specially crafted Session ID and Session Ticket to cause the system to return 31 bytes of uninitialized system memory.

BIG-IP virtual server systems configured with a Client SSL profile that has the non-default Session Tickets option enabled are affected.

The vendor has assigned ID 596340 to this vulnerability.

The vendor was notified on October 26, 2016.

This vulnerability is known as "Ticketbleed".

The original advisory is available at:

https://blog.filippo.io/finding-ticketbleed/

Filippo Valsorda reported this vulnerability.

Impact:   A remote user can obtain portions of system memory on the target system.
Solution:   The vendor has issued a fix (11.6.1 HF2).

The vendor advisory is available at:

https://support.f5.com/csp/article/K05121675

Vendor URL:  support.f5.com/csp/article/K05121675 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC