Lucene search

K
openvasCopyright (C) 2016 Greenbone AGOPENVAS:1361412562310105716
HistoryMay 17, 2016 - 12:00 a.m.

F5 BIG-IP - TCP vulnerability CVE-2015-8099

2016-05-1700:00:00
Copyright (C) 2016 Greenbone AG
plugins.openvas.org
11

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.008 Low

EPSS

Percentile

81.2%

Under limited conditions, an invalid TCP segment can lead to a Denial of Service for the High-Speed Bridge (HSB)
on the following platforms: 3900, 6900, 8900, 8950, 11000, 11050, PB100 or PB200. This issue is only exposed on virtual servers while
Software SYN cookies are configured for use and currently engaged. The scope of the exposure is limited to the BIG-IP data plane. The
access vector is network based and authentication is not a requirement for attack. There is no control plane exposure to this issue.

# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/h:f5:big-ip";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105716");
  script_cve_id("CVE-2015-8099");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_version("2024-05-29T05:05:18+0000");

  script_name("F5 BIG-IP - TCP vulnerability CVE-2015-8099");

  script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K35358312");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_tag(name:"summary", value:"Under limited conditions, an invalid TCP segment can lead to a Denial of Service for the High-Speed Bridge (HSB)
on the following platforms: 3900, 6900, 8900, 8950, 11000, 11050, PB100 or PB200. This issue is only exposed on virtual servers while
Software SYN cookies are configured for use and currently engaged. The scope of the exposure is limited to the BIG-IP data plane. The
access vector is network based and authentication is not a requirement for attack. There is no control plane exposure to this issue.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"last_modification", value:"2024-05-29 05:05:18 +0000 (Wed, 29 May 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-06-06 15:11:00 +0000 (Thu, 06 Jun 2019)");
  script_tag(name:"creation_date", value:"2016-05-17 10:59:01 +0200 (Tue, 17 May 2016)");
  script_category(ACT_GATHER_INFO);
  script_family("F5 Local Security Checks");
  script_copyright("Copyright (C) 2016 Greenbone AG");
  script_dependencies("gb_f5_big_ip_ssh_login_detect.nasl");
  script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");
  exit(0);
}

include("f5.inc");
include("host_details.inc");
include("list_array_func.inc");
include("version_func.inc");

if (!version = get_app_version(cpe: CPE, service: "ssh-login"))
  exit(0);

check_f5["LTM"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["AAM"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.4.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;");

check_f5["AFM"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;");

check_f5["AVR"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;11.0.0-11.2.1;");

check_f5["APM"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["ASM"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["GTM"] = make_array("affected",   "11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "11.6.1;11.5.4;11.4.1_HF10;11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["LC"]  = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["PEM"] = make_array("affected",   "12.0.0;11.6.0;11.5.0-11.5.3;11.3.0-11.4.1;",
                             "unaffected", "12.1.0;12.0.0_HF1;11.6.1;11.5.4;11.4.1_HF10;");

check_f5["PSM"] = make_array("affected",   "11.3.0-11.4.1;",
                             "unaffected", "11.4.1_HF10;11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["WAM"] = make_array("affected",   "11.3.0;",
                             "unaffected", "11.0.0-11.2.1;10.1.0-10.2.4;");

check_f5["WOM"] = make_array("affected",   "11.3.0;",
                             "unaffected", "11.0.0-11.2.1;10.1.0-10.2.4;");

if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.008 Low

EPSS

Percentile

81.2%

Related for OPENVAS:1361412562310105716