8 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.94 High
EPSS
Percentile
99.0%
Description
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search. (CVE-2013-4449)
Impact
None. F5 products are not affected by this vulnerability.
Status
To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:
Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature |
---|---|---|---|---|
BIG-IP LTM | None | |||
11.0.0 - 11.6.0 | ||||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP AAM | None | 11.4.0 - 11.6.0 | ||
Not vulnerable | None | |||
BIG-IP AFM | None | 11.3.0 - 11.6.0 | ||
Not vulnerable | None | |||
BIG-IP Analytics | None | 11.0.0 - 11.6.0 | ||
Not vulnerable | None | |||
BIG-IP APM | None | 11.0.0 - 11.6.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP ASM | None | 11.0.0 - 11.6.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP Edge Gateway | ||||
None | 11.0.0 - 11.3.0 | |||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP GTM | None | 11.0.0 - 11.6.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP Link Controller | None | |||
11.0.0 - 11.6.0 | ||||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP PEM | None | |||
11.3.0 - 11.6.0 | ||||
Not vulnerable | None | |||
BIG-IP PSM | None | 11.0.0 - 11.4.1 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP WebAccelerator | None | 11.0.0 - 11.3.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP WOM | None | 11.0.0 - 11.3.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
ARX | None | 6.0.0 - 6.4.0 | ||
Not vulnerable | None | |||
Enterprise Manager | None | 3.0.0 - 3.1.1 | ||
Not vulnerable | None | |||
FirePass | None | 7.0.0 | ||
6.0.0 - 6.1.0 | ||||
Not vulnerable | None | |||
BIG-IQ Cloud | None | |||
4.0.0 - 4.5.0 | ||||
Not vulnerable | None | |||
BIG-IQ Device | None | |||
4.2.0 - 4.5.0 | ||||
Not vulnerable | None | |||
BIG-IQ Security | None | |||
4.0.0 - 4.5.0 | ||||
Not vulnerable | None | |||
BIG-IQ ADC | None | |||
4.5.0 | ||||
Not vulnerable | None | |||
LineRate | None | |||
2.5.0 - 2.6.0 | ||||
Not vulnerable | None | |||
F5 WebSafe | None | |||
1.0.0 | ||||
Not vulnerable | None | |||
Traffix SDC | None | |||
4.0.0 - 4.4.0 | ||||
3.3.2 - 3.5.1 | ||||
Not vulnerable | None |
Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.
Recommended Action
None
Supplemental Information