Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310107207
HistoryMay 29, 2017 - 12:00 a.m.

F5 BIG-IP - TMM vulnerability CVE-2017-6137

2017-05-2900:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
14

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

46.1%

Undisclosed traffic patterns received while software SYN cookie protection is
engaged may cause a disruption of service to the Traffic Management Microkernel (TMM) on specific platforms and
configurations. (CVE-2017-6137)

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/h:f5:big-ip";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.107207");
  script_cve_id("CVE-2017-6137");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_version("2024-05-29T05:05:18+0000");

  script_name("F5 BIG-IP - TMM vulnerability CVE-2017-6137");

  script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K82851041");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_tag(name:"summary", value:"Undisclosed traffic patterns received while software SYN cookie protection is
  engaged may cause a disruption of service to the Traffic Management Microkernel (TMM) on specific platforms and
  configurations. (CVE-2017-6137)");

  script_tag(name:"impact", value:"When software syncookie protection is activated for a virtual server (the
  connection.syncookies.threshold database value has been exceeded), and the unit also has the Traffic Management
  Microkernel (TMM) fast forward enabled (the tmm.ffwd.enable database value is true, the default), and TCP
  Segmentation Offload (TSO) is enabled (the tm.tcpsegmentationoffload database value is true, the default) a
  specific sequence of packets causes TMM to generate an egress packet with an invalid MSS. As a result, packets
  egressing the BIG-IP system with an invalid MSS may be dropped by a neighboring device. Additionally, on the 3900,
  6900, 8900, 8950, 11000, and 11050 platforms this may cause the high-speed bridge (HSB) to lock up.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"last_modification", value:"2024-05-29 05:05:18 +0000 (Wed, 29 May 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
  script_tag(name:"creation_date", value:"2017-05-29 14:28:20 +0200 (Mon, 29 May 2017)");

  script_category(ACT_GATHER_INFO);
  script_family("F5 Local Security Checks");
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_dependencies("gb_f5_big_ip_ssh_login_detect.nasl");
  script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");

  exit(0);
}

include("f5.inc");
include("host_details.inc");
include("list_array_func.inc");
include("version_func.inc");

if (!version = get_app_version(cpe: CPE, service: "ssh-login"))
  exit(0);

check_f5["LTM"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;11.2.1;");

check_f5["AAM"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;");

check_f5["AFM"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;");

check_f5["AVR"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;11.2.1;");

check_f5["APM"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;11.2.1;");

check_f5["ASM"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;11.2.1;");

check_f5["LC"]  = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;11.2.1;");

check_f5["PEM"] = make_array("affected",   "12.1.0-12.1.2;12.0.0_HF3;12.0.0_HF4;11.6.1_HF1;",
                             "unaffected", "13.0.0;12.1.2_HF1;11.6.1_HF2;11.4.0-11.6.1;");

if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

46.1%

Related for OPENVAS:1361412562310107207