F5

Big-ip Domain Name System

387 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.53%
  • Veröffentlicht 10.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:31

When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not...

  • EPSS 3.82%
  • Veröffentlicht 06.09.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:43

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments...

  • EPSS 3.92%
  • Veröffentlicht 06.08.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:08:43

Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

  • EPSS 0.18%
  • Veröffentlicht 25.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:00

Through undisclosed methods, on F5 BIG-IP 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6, adjacent network attackers can cause a denial of service for VCMP guest and host systems. Attack must be sourced from adjacent network (lay...

  • EPSS 0.38%
  • Veröffentlicht 25.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:01

On F5 BIG-IP DNS 13.1.0-13.1.0.7, 12.1.3-12.1.3.5, DNS Express / DNS Zones accept NOTIFY messages on the management interface from source IP addresses not listed in the 'Allow NOTIFY From' configuration parameter when the db variable "dnsexpress.noti...

  • EPSS 0.84%
  • Veröffentlicht 25.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:02

F5 BIG-IP 13.0.0-13.0.1, 12.1.0-12.1.3.6, or 11.2.1-11.6.3.2 HTTPS health monitors do not validate the identity of the monitored server.

  • EPSS 0.39%
  • Veröffentlicht 19.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:00

On F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.0-11.6.3.1, or 11.2.1-11.5.6 a domain name cached within the DNS Cache of TMM may continue to be resolved by the cache even after the parent server revokes the record, if the DNS Cache is receiving a stream of...

  • EPSS 0.75%
  • Veröffentlicht 19.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:00

Under certain conditions on F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.0-11.6.3.1, or 11.5.0-11.5.6, TMM may core while processing SSL forward proxy traffic.

  • EPSS 0.75%
  • Veröffentlicht 19.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:00

Under certain conditions on F5 BIG-IP 13.1.0-13.1.0.5, 13.0.0, 12.1.0-12.1.3.1, 11.6.0-11.6.3.1, or 11.5.0-11.5.6, TMM may core while processing SSL forward proxy traffic.

  • EPSS 1.31%
  • Veröffentlicht 19.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:01

On F5 BIG-IP 14.0.0, 13.0.0-13.1.0, 12.1.0-12.1.3, or 11.5.1-11.6.3 specifically crafted HTTP responses, when processed by a Virtual Server with an associated QoE profile that has Video enabled, may cause TMM to incorrectly buffer response data causi...