Lucene search

K
f5F5F5:K9528
HistoryMar 27, 2013 - 12:00 a.m.

K9528 : IPv6 Neighbor Discovery Protocol (NDP) vulnerability CVE-2008-2476 - VU#472363

2013-03-2700:00:00
my.f5.com
20

6.3 Medium

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.027 Low

EPSS

Percentile

89.4%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.3 - 9.3.1
9.4 - 9.4.8
9.6 - 9.6.1
10.0.0 9.3.1 HF5 and later
10.0.0 HF2 and later
10.0.1
10.1.x
10.2.x
11.x
BIG-IP GTM 9.3 - 9.3.1
9.4 - 9.4.8
10.0.0 9.3.1 HF5 and later
10.0.0 HF2 and later
10.0.1
10.1.x
10.2.x
11.x

BIG-IP ASM| 9.3 - 9.3.1
9.4 - 9.4.8
10.0.0 | 9.3.1 HF5 and later
10.0.0 HF2 and later
10.0.1
10.1.x
10.2.x
11.x
BIG-IP Link Controller| 9.3 - 9.3.1
9.4 - 9.4.8
10.0.0 | 9.3.1 HF5 and later
10.0.0 HF2 and later
10.0.1
10.1.x
10.2.x
11.x
BIG-IP WebAccelerator| 9.4 - 9.4.8
10.0.0 | 9.3.1 HF5 and later
10.0.0 HF2 and later
10.0.1
10.1.x
10.2.x
11.x
BIG-IP PSM| 9.4.8
10.0.0 | 9.3.1 HF5 and later
10.0.0 HF2 and later
10.0.1
10.1.x
10.2.x
11.x
BIG-IP WOM| 10.0.0| 10.0.1
10.1.x
10.2.x
11.x
BIG-IP APM| None| 10.1.x
10.2.x
11.x
BIG-IP Edge Gateway| None| 10.1.x
10.2.x
11.x
BIG-IP Analytics| None| 11.x

BIG-IP A| None| 11.x
BIG-IP A| None| 11.x
FirePass| None| 5.x
6.x
7.x
Enterprise Manager| 1.2.0 - 1.8.0| 2.x
3.x
ARX| None| 2.x
3.x
4.x
5.x
6.x

Note: The products listed as vulnerable are vulnerable only if IPv6 is licensed and configured for the affected device.

The IPv6 Neighbor Discovery Protocol (NDP) implementation does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic by way of a spoofed message that modifies the Forward Information Base (FIB).

Information about this advisory is available at the following locations:

Note: These links take you to a resource outside of AskF5, and it is possible that the documents may be removed without our knowledge.

<https://vulners.com/cve/CVE-2008-2476&gt;
<http://www.kb.cert.org/vuls/id/472363&gt;

F5 Product Development tracked this issue as CR111056 and CR111064 and it was fixed in BIG-IP 10.0.1 and Enterprise Manager 2.0.0. For information about upgrading, refer to the BIG-IP LTM, GTM, Link Controller, ASM, PSM, WebAccelerator, WOM, or Enterprise Manager release notes.

6.3 Medium

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.027 Low

EPSS

Percentile

89.4%