SOL12826 - Java Runtime Environment (JRE) vulnerability: CVE-2010-4476

ID SOL12826
Type f5
Reporter f5
Modified 2016-07-25T00:00:00


  • These F5 product versions use the affected Java function to manage traffic in the Configuration utility. However, the system filters the input value to the function so the value falls within an expected range before the system passes data to the function. These expected ranges of data do not include data that can trigger this JRE vulnerability, so the system can safely use this function, and these F5 product versions are not vulnerable.

A JRE vulnerability could allow a remote attacker to cause a denial-of-service (DoS) by using a crafted string that triggers an infinite loop.

None of the F5 product versions listed in this article, including those marked with an asterisk (*), use Java for production traffic packet processing and, therefore, are not vulnerable to this issue for production traffic.

Information about this advisory is available at the following location:

Common Vulnerabilities and Exposures (CVE-2010-4476)

Note: This link takes you to a resource outside of AskF5, and it is possible that the documents may be removed without our knowledge.