Lucene search

K
cve[email protected]CVE-2017-6163
HistoryOct 27, 2017 - 2:29 p.m.

CVE-2017-6163

2017-10-2714:29:00
CWE-119
web.nvd.nist.gov
26
cve-2017-6163
f5 big-ip
ltm
aam
afm
apm
asm
http/2
spdy
client ssl
nvd
security vulnerability

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

68.6%

In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, PSM software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, when a virtual server uses the standard configuration of HTTP/2 or SPDY profile with Client SSL profile, and the client initiates a number of concurrent streams beyond the advertised limit can cause a disruption of service. Remote client initiating stream beyond the advertised limit can cause a disruption of service. The Traffic Management Microkernel (TMM) data plane is exposed to this issue; the control plane is not exposed.

Affected configurations

NVD
Node
f5big-ip_local_traffic_managerRange11.4.011.5.3
OR
f5big-ip_local_traffic_managerMatch11.6.0
OR
f5big-ip_local_traffic_managerMatch11.6.1
OR
f5big-ip_local_traffic_managerMatch12.0.0
OR
f5big-ip_local_traffic_managerMatch12.1.0
OR
f5big-ip_local_traffic_managerMatch12.1.1
OR
f5big-ip_local_traffic_managerMatch12.1.2
Node
f5big-ip_application_acceleration_managerRange11.4.011.5.4
OR
f5big-ip_application_acceleration_managerMatch11.6.0
OR
f5big-ip_application_acceleration_managerMatch11.6.1
OR
f5big-ip_application_acceleration_managerMatch12.0.0
OR
f5big-ip_application_acceleration_managerMatch12.1.0
OR
f5big-ip_application_acceleration_managerMatch12.1.1
OR
f5big-ip_application_acceleration_managerMatch12.1.2
Node
f5big-ip_advanced_firewall_managerRange11.4.011.5.4
OR
f5big-ip_advanced_firewall_managerMatch11.6.0
OR
f5big-ip_advanced_firewall_managerMatch11.6.1
OR
f5big-ip_advanced_firewall_managerMatch12.0.0
OR
f5big-ip_advanced_firewall_managerMatch12.1.0
OR
f5big-ip_advanced_firewall_managerMatch12.1.1
OR
f5big-ip_advanced_firewall_managerMatch12.1.2
Node
f5big-ip_access_policy_managerRange11.5.011.5.4
OR
f5big-ip_access_policy_managerMatch11.6.0
OR
f5big-ip_access_policy_managerMatch11.6.1
OR
f5big-ip_access_policy_managerMatch12.0.0
OR
f5big-ip_access_policy_managerMatch12.1.0
OR
f5big-ip_access_policy_managerMatch12.1.1
OR
f5big-ip_access_policy_managerMatch12.1.2
Node
f5big-ip_application_security_managerRange11.5.011.5.4
OR
f5big-ip_application_security_managerMatch11.6.0
OR
f5big-ip_application_security_managerMatch11.6.1
OR
f5big-ip_application_security_managerMatch12.0.0
OR
f5big-ip_application_security_managerMatch12.1.0
OR
f5big-ip_application_security_managerMatch12.1.1
OR
f5big-ip_application_security_managerMatch12.1.2
Node
f5big-ip_link_controllerRange11.5.011.5.4
OR
f5big-ip_link_controllerMatch11.6.0
OR
f5big-ip_link_controllerMatch11.6.1
OR
f5big-ip_link_controllerMatch12.0.0
OR
f5big-ip_link_controllerMatch12.1.0
OR
f5big-ip_link_controllerMatch12.1.1
OR
f5big-ip_link_controllerMatch12.1.2
Node
f5big-ip_policy_enforcement_managerRange11.5.011.5.4
OR
f5big-ip_policy_enforcement_managerMatch11.6.0
OR
f5big-ip_policy_enforcement_managerMatch11.6.1
OR
f5big-ip_policy_enforcement_managerMatch12.0.0
OR
f5big-ip_policy_enforcement_managerMatch12.1.0
OR
f5big-ip_policy_enforcement_managerMatch12.1.1
OR
f5big-ip_policy_enforcement_managerMatch12.1.2
Node
f5big-ip_protocol_security_moduleRange11.4.011.5.4
OR
f5big-ip_protocol_security_moduleMatch11.6.0
OR
f5big-ip_protocol_security_moduleMatch11.6.1
OR
f5big-ip_protocol_security_moduleMatch12.0.0
OR
f5big-ip_protocol_security_moduleMatch12.1.0
OR
f5big-ip_protocol_security_moduleMatch12.1.1
OR
f5big-ip_protocol_security_moduleMatch12.1.2

CNA Affected

[
  {
    "product": "BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, PSM",
    "vendor": "F5 Networks, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "12.0.0 - 12.1.2"
      },
      {
        "status": "affected",
        "version": "11.6.0 &#xe2"
      },
      {
        "status": "affected",
        "version": "&#x80"
      },
      {
        "status": "affected",
        "version": "\" 11.6.1"
      },
      {
        "status": "affected",
        "version": "11.4.0 &#xe2"
      },
      {
        "status": "affected",
        "version": "\" 11.5.4"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

68.6%

Related for CVE-2017-6163