SB2025063003 - F5 BIG-IP (DNS) big3d component update for Python 



SB2025063003 - F5 BIG-IP (DNS) big3d component update for Python

Published: June 30, 2025

Security Bulletin ID SB2025063003
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) XML External Entity injection (CVE-ID: CVE-2022-48565)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input within the plistlib module. A remote attacker can pass a specially crafted XML code to the affected application and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


2) Command injection (CVE-ID: CVE-2018-1000802)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to command injection in shutil module (make_archive function). A remote attacker can supply passage of unfiltered user input to the function and inject arbitrary commands to access arbitrary data or cause the service to crash.


3) Integer overflow (CVE-ID: CVE-2016-9063)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an integer overflow when handling malicious XML files. A remote attacker can send manipulated XML content, trick the victim into opening it and cause the application using the Expat library to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.