7.1 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.037 Low
EPSS
Percentile
90.9%
Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.
F5 products and versions that have been evaluated for this Security Advisory
Product | Affected | Not Affected |
---|---|---|
BIG-IP LTM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP GTM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP ASM | 9.3.0 - 9.3.1 | |
9.4.0 - 9.4.8 | ||
10.0.0 - 10.2.4 | 11.x | |
BIG-IP Link Controller | None | 9.x |
10.x | ||
11.x | ||
BIG-IP WebAccelerator | None | 9.x |
10.x | ||
11.x | ||
BIG-IP PSM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP WAN Optimization | None | 10.x |
11.x | ||
BIG-IP APM | None | 10.x |
11.x | ||
BIG-IP Edge Gateway | None | 10.x |
11.x | ||
BIG-IP Analytics | None | 11.x |
BIG-IP AFM | None | 11.x |
BIG-IP PEM | ||
None | 11.x | |
FirePass | None | 5.x |
6.x | ||
7.x | ||
Enterprise Manager | None | 1.x |
2.x | ||
3.x |
ARX| None| 2.x
3.x
4.x
5.x
6.x
Vulnerability description and product information
A heap-based buffer overflow in PHP 4.3.0 through 5.2.6 may allow attackers to execute arbitrary code.
Information about this advisory is available at the following location:
Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.
<https://vulners.com/cve/CVE-2008-5557>
F5 Product Development tracked this issue as ID 309780 (formerly CR115185) and it was fixed in BIG-IP ASM version 11.0.0.