SB2019122201 - Denial of service in F5 Networks BIG-IP
Published: December 22, 2019 Updated: December 24, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2019-6684)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of vCMP packets in Traffic Management Microkernel (TMM). A remote attacker on the local network can send specially crafted broadcast IP fragments that will cause the TMM to reload, resulting in a denial of service (DoS) attack.
2) Input validation error (CVE-ID: CVE-2019-6678)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the Traffic Management Microkernel (TMM) process. A remote attacker can send specially crafted traffic to the affected device and cause its reload.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-6685)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper privilege management. A remote user access to edit iRules is able to create iRules that may allow to change system configuration and execute arbitrary commands.
4) Input validation error (CVE-ID: CVE-2019-6677)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the Traffic Management Microkernel (TMM) process, when using custom TCP congestion control settings in a TCP profile. A remote attacker can send specially crafted traffic to the device and cause TMM to stop processing traffic when handled by an iRule.
5) Information disclosure (CVE-ID: CVE-2019-6688)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error that allows an SNMP user to obtain the secret used to encrypt the BIG-IP UCS backup file. A remote user can gain access to sensitive information and use it to perform further attacks.
Remediation
Install update from vendor's website.