vulnerability alert CVE-2013-6016
F5 BIG-IP: denial of service of TMM via TCP
Synthesis of the vulnerability
An attacker can initialize a TCP session to F5 BIG-IP, in order to trigger a denial of service.Impacted products: BIG-IP Appliance
BID-63245, CVE-2013-6016, SOL13233, VIGILANCE-VUL-13616.
Description of the vulnerability
The TMM (Traffic Management Microkernel) manages the load balancing.
The establishment of a TCP session requires three packets:
However, in some cases, BIG-IP transits the TCP session to the ESTABLISHED state, before receiving the ACK packet. This error then leads to a segmentation error, or to an assertion of TMM.
An attacker can therefore initialize a TCP session to F5 BIG-IP, in order to trigger a denial of service.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides a network vulnerability alert
. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.