The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of F5 BIG-IP Hardware

computer vulnerability alert CVE-2017-3736

OpenSSL: Man-in-the-Middle via bn_sqrx8x_internal

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle and use a carry error of bn_sqrx8x_internal() on OpenSSL, in order to read or write data in the session.
Impacted products: SDS, SNS, Blue Coat CAS, ProxyAV, ProxySG par Blue Coat, SGOS by Blue Coat, Debian, BIG-IP Hardware, TMOS, Fedora, FreeBSD, hMailServer, Domino, Notes, IRAD, Rational ClearCase, QRadar SIEM, Tivoli Storage Manager, WebSphere AS Traditional, WebSphere MQ, Juniper J-Series, Junos OS, NSM Central Manager, NSMXpress, SRX-Series, MariaDB ~ precise, McAfee Email Gateway, McAfee NSP, McAfee NTBA, VirusScan, McAfee Web Gateway, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle Internet Directory, Solaris, Tuxedo, WebLogic, Percona Server, XtraDB Cluster, pfSense, RHEL, Slackware, stunnel, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, SGOS by Symantec, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.
Severity: 1/4.
Consequences: data reading, data creation/edition.
Provenance: internet client.
Creation date: 02/11/2017.
Identifiers: 2012827, 2013025, 2014202, 2014651, 2014669, 2015080, bulletinapr2018, bulletinjan2018, CERTFR-2017-AVI-391, cpuapr2018, cpujan2018, cpujan2019, cpujul2018, cpuoct2018, CVE-2017-3736, DSA-4017-1, DSA-4018-1, FEDORA-2017-4cf72e2c11, FEDORA-2017-512a6c5aae, FEDORA-2017-55a3247cfd, FEDORA-2017-7f30914972, FEDORA-2017-dbec196dd8, FreeBSD-SA-17:11.openssl, ibm10715641, ibm10719113, ibm10732391, ibm10733905, ibm10738249, ibm10738401, JSA10851, K14363514, openSUSE-SU-2017:3192-1, openSUSE-SU-2018:0029-1, openSUSE-SU-2018:0315-1, RHSA-2018:0998-01, RHSA-2018:2568-01, RHSA-2018:2575-01, SA157, SB10211, SB10220, SSA:2017-306-02, STORM-2017-006, SUSE-SU-2018:2839-1, SUSE-SU-2018:3082-1, TNS-2017-15, USN-3475-1, VIGILANCE-VUL-24316.

Description of the vulnerability

An attacker can act as a Man-in-the-Middle and use a carry error of bn_sqrx8x_internal() on OpenSSL, in order to read or write data in the session.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-6163

F5 BIG-IP: denial of service via Client SSL Profile HTTP/2-SPDY

Synthesis of the vulnerability

An attacker can generate a fatal error via Client SSL Profile HTTP/2-SPDY of F5 BIG-IP, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: internet client.
Creation date: 27/10/2017.
Identifiers: CVE-2017-6163, K22541983, VIGILANCE-VUL-24257.

Description of the vulnerability

An attacker can generate a fatal error via Client SSL Profile HTTP/2-SPDY of F5 BIG-IP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-6162

F5 BIG-IP: denial of service via TCP Traffic

Synthesis of the vulnerability

An attacker can generate a fatal error via TCP Traffic of F5 BIG-IP, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: internet client.
Creation date: 27/10/2017.
Identifiers: CVE-2017-6162, K13421245, VIGILANCE-VUL-24256.

Description of the vulnerability

An attacker can generate a fatal error via TCP Traffic of F5 BIG-IP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2017-6161

F5 BIG-IP: denial of service via ConfigSync mcpd

Synthesis of the vulnerability

An attacker can generate a fatal error via ConfigSync mcpd of F5 BIG-IP, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Creation date: 27/10/2017.
Identifiers: CVE-2017-6161, K62279530, VIGILANCE-VUL-24255.

Description of the vulnerability

An attacker can generate a fatal error via ConfigSync mcpd of F5 BIG-IP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2017-6160

F5 BIG-IP: denial of service via Virtual Server Profile

Synthesis of the vulnerability

An attacker can generate a fatal error via Virtual Server Profile of F5 BIG-IP, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: internet client.
Creation date: 27/10/2017.
Identifiers: CVE-2017-6160, K19430431, VIGILANCE-VUL-24254.

Description of the vulnerability

An attacker can generate a fatal error via Virtual Server Profile of F5 BIG-IP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-6159

F5 BIG-IP: denial of service via MPTCP Option

Synthesis of the vulnerability

An attacker can generate a fatal error via MPTCP Option of F5 BIG-IP, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 27/10/2017.
Identifiers: CVE-2017-6159, K10002335, VIGILANCE-VUL-24253.

Description of the vulnerability

An attacker can generate a fatal error via MPTCP Option of F5 BIG-IP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-0303

F5 BIG-IP: memory leak via SOCKS Proxy

Synthesis of the vulnerability

An attacker can create a memory leak via SOCKS Proxy of F5 BIG-IP, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 27/10/2017.
Identifiers: CVE-2017-0303, K30201296, VIGILANCE-VUL-24251.

Description of the vulnerability

An attacker can create a memory leak via SOCKS Proxy of F5 BIG-IP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-12613

Apache APR-core: out-of-bounds memory reading via apr_exp_tim

Synthesis of the vulnerability

An attacker can force a read at an invalid address via apr_exp_tim() of Apache APR-core, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: APR-core, Mac OS X, Debian, BIG-IP Hardware, TMOS, Fedora, Junos Space, openSUSE Leap, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: data reading, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 24/10/2017.
Identifiers: bulletinjul2018, CVE-2017-12613, DLA-1162-1, FEDORA-2017-8d2cfc3752, HT209139, HT209193, JSA10873, K52319810, openSUSE-SU-2018:1214-1, RHSA-2017:3270-01, RHSA-2018:0465-01, RHSA-2018:0466-01, RHSA-2018:1253-01, SUSE-SU-2018:1322-1, VIGILANCE-VUL-24220.

Description of the vulnerability

An attacker can force a read at an invalid address via apr_exp_tim() of Apache APR-core, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-6165

F5 BIG-IP: information disclosure via VIPRION /var/log/ltm

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via VIPRION /var/log/ltm of F5 BIG-IP, in order to obtain sensitive information.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 2/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 20/10/2017.
Identifiers: CERTFR-2017-AVI-376, CVE-2017-6165, K74759095, VIGILANCE-VUL-24193.

Description of the vulnerability

An attacker can bypass access restrictions to data via VIPRION /var/log/ltm of F5 BIG-IP, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2017-12190

Linux kernel: memory leak via SCSI IO Vectors

Synthesis of the vulnerability

An attacker can create a memory leak via SCSI IO Vectors of the Linux kernel, in order to trigger a denial of service.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, Linux, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: denial of service on server.
Provenance: privileged shell.
Creation date: 11/10/2017.
Identifiers: CERTFR-2017-AVI-424, CERTFR-2017-AVI-426, CERTFR-2018-AVI-094, CERTFR-2018-AVI-161, CERTFR-2018-AVI-175, CERTFR-2018-AVI-197, CERTFR-2018-AVI-206, CERTFR-2018-AVI-224, CERTFR-2018-AVI-241, CVE-2017-12190, DLA-1200-1, FEDORA-2017-c110ac0eb1, FEDORA-2017-cafcdbdde5, FEDORA-2018-884a105c04, K93472064, LSN-0035-1, RHSA-2018:0654-01, RHSA-2018:0676-01, RHSA-2018:1062-01, RHSA-2018:1854-01, SUSE-SU-2018:0834-1, SUSE-SU-2018:0848-1, SUSE-SU-2018:1080-1, SUSE-SU-2018:1172-1, SUSE-SU-2018:1309-1, USN-3487-1, USN-3582-1, USN-3582-2, USN-3583-1, USN-3583-2, VIGILANCE-VUL-24094.

Description of the vulnerability

An attacker can create a memory leak via SCSI IO Vectors of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about F5 BIG-IP Hardware: