F5

Big-ip Fraud Protection Service

325 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.89%
  • Veröffentlicht 28.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:47

In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impa...

  • EPSS 0.65%
  • Veröffentlicht 28.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:47

On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3.6, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, hardware systems with a High-Speed Bridge and using non-default Layer 2 forwarding configurations may experience a lockup of the ...

  • EPSS 0.89%
  • Veröffentlicht 28.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:47

On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, and 12.0.x, an undisclosed sequence of packets received by an SSL virtual server and processed by an associated Client SSL or Server SSL profile may cause a denial of service.

  • EPSS 0.27%
  • Veröffentlicht 28.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:47

On BIG-IP 11.5.1-11.6.3.4, 12.1.0-12.1.3.7, 13.0.0-13.1.1.3, and 14.0.0-14.0.0.2, when processing certain SNMP requests with a request-id of 0, the snmpd process may leak a small amount of memory.

  • EPSS 0.61%
  • Veröffentlicht 28.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:47

On BIG-IP 11.5.1-11.6.3, 12.1.0-12.1.3, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, the snmpd daemon may leak memory on a multi-blade BIG-IP vCMP guest when processing authorized SNMP requests.

  • EPSS 0.47%
  • Veröffentlicht 13.03.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:46

In BIG-IP 13.0.0-13.1.1.1, 12.1.0-12.1.3.7, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configurat...

  • EPSS 0.32%
  • Veröffentlicht 13.03.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:46

In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 or Enterprise Manager 3.1.1, malformed requests to the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, may ...

  • EPSS 0.36%
  • Veröffentlicht 13.03.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:46

In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.3, 12.1.0-12.1.3.7, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when remote authentication is enabled for administrative users and all external users are granted the "guest" role, unsanitized values can be reflected to...

  • EPSS 5.05%
  • Veröffentlicht 27.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...

  • EPSS 0.33%
  • Veröffentlicht 26.02.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:45

On BIG-IP 14.1.0-14.1.0.1, TMM may restart and produce a core file when validating SSL certificates in client SSL or server SSL profiles.