Vulnerability identifier: #VU49068
Vulnerability risk: Low
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-401
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
BIG-IP DNS
Hardware solutions /
Routers & switches, VoIP, GSM, etc
BIG-IP Link Controller
Hardware solutions /
Routers & switches, VoIP, GSM, etc
BIG-IP GTM
Hardware solutions /
Security hardware applicances
Vendor: F5 Networks
Description
The vulnerability allows a remote user to perform DoS attack on the target system.
The vulnerability exists due memory leak in zxfrd process when listing DNS zones. A remote user with access to TMSH, iControl or SNMP can force the application to leak memory and perform denial of service attack.
This vulnerability affects only BIG-IP systems that are provisioned with BIG-IP DNS or BIG-IP GTM and at least one DNS zone.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
BIG-IP DNS: 11.6.1 - 15.1.0.5
BIG-IP GTM: 11.6.1 - 15.1.0.5
BIG-IP Link Controller: 11.6.1 - 15.1.0.5
External links
http://support.f5.com/csp/article/K25595031
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.