Lucene search

K
f5F5SOL15304
HistoryJun 02, 2014 - 12:00 a.m.

SOL15304 - Linux kernel tcp_rcv_state_process vulnerability CVE-2012-6638

2014-06-0200:00:00
support.f5.com
34

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.007 Low

EPSS

Percentile

78.7%

Recommended action

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists. F5 recommends that you limit network access to the management interface to a secure, management-only network.

FirePass

To protect the FirePass Controller, you can use a TCP and/or IP proxy in front of FirePass to mitigate the issue.

Note: For information about Linux kernel versions that the BIG-IP system uses, and how the BIG-IP system uses the Linux operating system, refer to SOL3645: Base operating system information for the BIG-IP Host system.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL13284: Overview of management interface routing (11.x)
  • SOL3669: Overview of management interface routing (9.x - 10.x)

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.007 Low

EPSS

Percentile

78.7%