Lucene search

K
f5F5SOL14468
HistoryJun 26, 2013 - 12:00 a.m.

SOL14468 - Client-side component flaw CVE-2013-0150

2013-06-2600:00:00
support.f5.com
19

0.002 Low

EPSS

Percentile

60.8%

Vulnerability Recommended Actions

To eliminate this vulnerability, upgrade to a version that is listed in the Versions known to be not vulnerablecolumn in the previous table. A fixed client component will automatically be downloaded the next time a client is authenticated to the APM or FirePass host.

Acknowledgements

F5 would like to acknowledge Neal Poole for bringing this issue to our attention, and for following the highest standards of responsible disclosure.

Supplemental Information

Note: This link will take you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents.
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)
  • SOL10025: Managing BIG-IP product hotfixes (10.x)
  • SOL9502: BIG-IP hotfix matrix
  • SOL10322: FirePass hotfix matrix
  • SOL3430: Installing FirePass hotfixes

0.002 Low

EPSS

Percentile

60.8%