SB2017122002 - Multiple vulnerabilities in F5 BIG-IP



SB2017122002 - Multiple vulnerabilities in F5 BIG-IP

Published: December 25, 2017

Security Bulletin ID SB2017122002
Severity
Low
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2017-6134)

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The vulnerability exists in the default configuration due to insufficient validation of user-supplied input. An adjacent attacker can send specially crafted packets to cause the target Traffic Management Microkernel (TMM) to restart and traffic to disrupt.

Successful exploitation of the vulnerability results in denial of service.


2) Improper input validation (CVE-ID: CVE-2017-6136)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists on the systems with the TCP Fast Open and Tail Loss Probe options enabled in the associated TCP profile due to insufficient validation of user-supplied input. A remote attacker can send specially crafted traffic to the target virtual server, trigger an unspecified flaw and cause the Traffic Management Microkernel (TMM) to restart and traffic to disrupt.

Successful exploitation of the vulnerability results in denial of service.


3) Improper input validation (CVE-ID: CVE-2017-6133)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted HTTP request, trigger an unspecified flaw and cause the Traffic Management Microkernel (TMM) to restart and traffic to disrupt.

Successful exploitation of the vulnerability results in denial of service.


4) Improper input validation (CVE-ID: CVE-2017-6129)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists on the systems with the TCP Fast Open and Tail Loss Probe options enabled in the associated TCP profile due to insufficient validation of user-supplied input. A remote attacker can send specially crafted traffic to the target virtual server, trigger an unspecified flaw and cause the Traffic Management Microkernel (TMM) to restart and traffic to disrupt.

Successful exploitation of the vulnerability results in denial of service.


5) Improper input validation (CVE-ID: CVE-2017-6132)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists in the default configuration due to insufficient validation of user-supplied input. A remote attacker can send specially crafted packets to the target primary or secondary High Availability state mirror listeners to cause the target Traffic Management Microkernel (TMM) to restart and traffic to disrupt.

Successful exploitation of the vulnerability results in denial of service.


6) Resource exhaustion (CVE-ID: CVE-2017-6135)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to resource exhaustion. A remote attacker can send specially crafted IPv4 or IPv6 packets to the management port or self IP addresses, trigger a memory leak in the kernel, consume excessive memory and cause the service to crash.

Successful exploitation of the vulnerability results in denial of service.


7) Improper input validation (CVE-ID: CVE-2017-6138)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists on the systems with BIG-IP APM profiles and the systems with the non-default "normalize URI" configuration options used in iRules and/or BIG-IP LTM policies due to insufficient validation of user-supplied input. A remote attacker can send specially crafted requests to a target virtual server that has an HTTP profile, trigger an unspecified flaw and cause the Traffic Management Microkernel (TMM) to restart and traffic to disrupt.

Successful exploitation of the vulnerability results in denial of service.


8) Improper input validation (CVE-ID: CVE-2017-6151)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to resource exhaustion. A remote attacker can send specially crafted requests to a target virtual server that uses the 'HTTP/2 profile' to disrupt service to the Traffic Management Microkernel (TMM).

Successful exploitation of the vulnerability results in denial of service.


9) Information disclosure (CVE-ID: CVE-2017-6139)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists on the systems running in debug mode logging with BIG-IP APM due to the system may append potentially sensitive log details in response to client requests in certain cases. A remote attacker can read arbitrary file.


10) Race condition (CVE-ID: CVE-2017-6167)

The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.

The vulnerability exists due to race condition when handling malicious input. A remote attacker can send asynchronous tasks via the iControl REST interface, trigger a race condition and execute commands with elevated privileges on the target system.


11) Improper input validation (CVE-ID: CVE-2017-6164)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary commands on the target system.

The vulnerability exists in the default configuration due to insufficient validation of user-supplied input. A remote attacker can send specially crafted TLS 1.2 data, trigger a flaw in the ClientSSL profile component of the Traffic Management Microkernel (TMM) and cause it to crash or potentially execute commands on the target system.


Remediation

Install update from vendor's website.