Lucene search

K
f5F5F5:K12826
HistorySep 11, 2013 - 12:00 a.m.

K12826 : Java Runtime Environment (JRE) vulnerability: CVE-2010-4476

2013-09-1100:00:00
my.f5.com
24

9.1 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.041 Low

EPSS

Percentile

91.4%

Security Advisory Description

Note: For information about signing up to receive security notice updates from F5, refer to K9970: Subscribing to email notifications regarding F5 products.

Note: F5 has evaluated only versions of software that are listed in this article for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM None 9.x*
10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP GTM None 9.x*
10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP ASM None 9.x*
10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP Link Controller None 9.x*
10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x

BIG-IP WebAccelerator| None| 9.x*
10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP PSM| None| 9.x*
10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP WOM| None| 10.0.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP APM| None| 10.1.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP Edge Gateway| None| 10.1.0 - 10.2.1*
10.2.2 - 10.2.4
11.x
BIG-IP Analytics
| None| 11.x
BIG-IP AFM
| None| 11.x
BIG-IP PEM
| None| 11.x
BIG-IP AAM| None| 11.x
FirePass| None| 5.x
6.x
7.x
Enterprise Manager| None| 1.x
2.x
3.x
ARX| None| 4.x
5.x
6.x

  • These F5 product versions use the affected Java function to manage traffic in the Configuration utility. However, the system filters the input value to the function so the value falls within an expected range before the system passes data to the function. These expected ranges of data do not include data that can trigger this JRE vulnerability, so the system can safely use this function, and these F5 product versions are not vulnerable.

A JRE vulnerability could allow a remote attacker to cause a denial-of-service (DoS) by using a crafted string that triggers an infinite loop.

None of the F5 product versions listed in this article, including those marked with an asterisk (*), use Java for production traffic packet processing and, therefore, are not vulnerable to this issue for production traffic.

Information about this advisory is available at the following location:

Common Vulnerabilities and Exposures (CVE-2010-4476)

Note: This link takes you to a resource outside of AskF5, and it is possible that the documents may be removed without our knowledge.

9.1 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.041 Low

EPSS

Percentile

91.4%