2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-5058" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2015-08-24T14:59:05.773" ,
2024-11-23 01:05:45 +00:00
"lastModified" : "2024-11-21T02:32:14.270" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Memory leak in the virtual server component in F5 Big-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.5.x before 11.5.1 HF10, 11.5.3 before HF1, and 11.6.0 before HF5, BIG-IQ Cloud, Device, and Security 4.4.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted ICMP packets."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de fuga de memoria en el componente de servidor virtual en F5 Big-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller y PEM 11.5.x en versiones anteriores a 11.5.1 HF10, 11.5.3 en versiones anteriores a HF1 y 11.6.0 en versiones anteriores a HF5, BIG-IQ Cloud, Device y Security 4.4.0 hasta la versi\u00f3n 4.5.0 y BIG-IQ ADC 4.5.0, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de la memoria) a trav\u00e9s de un gran n\u00famero de paquetes ICMP manipulados."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-23 01:05:45 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 01:05:45 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC6C5628-14FF-4D75-B62E-D4B2707C1E3D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BCF94129-8779-4D68-8DD4-B828CA633746"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFA77C6B-72DB-4D57-87CF-11F2C7EDB828"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA244A7D-F65D-4114-81C8-CE811959EA10"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96CF015E-C74B-4215-9103-8087BC1D12AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B276E4DF-69FC-4158-B93A-781A45605034"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B33B2082-E040-4799-A260-BA687ED8614E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2E93EE3-DB73-468E-87CA-4D277F283648"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A4489382-0668-4CFB-BA89-D54762937CEE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "281D0B5B-27DF-4E8A-AFC9-D09468F8ECDF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5B40837-EC2B-41FB-ACC3-806054EAF28C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "855E91A4-0A0C-4E5C-8019-FB513A793803"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8923BB93-96C1-417B-9172-4A81E731EBA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "475F0EF8-42CB-4099-9C4A-390F946C4924"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B50BF19F-71B4-47C0-A96E-6EB90FCC6AE7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "202B6870-718C-4F8D-9BAB-7ED6385BF2A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7D7863D-B064-4D7A-A66B-C3D3523425FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB017D7A-3290-4EF5-9647-B488771A5F32"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC0F5FD3-45E7-4D55-A3AC-6572FC0682D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5CDEC701-DAB3-4D92-AA67-B886E6693E46"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12F86EB5-D581-4103-A802-44D968BA8D55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9768142-C554-44DE-B8D5-45CB51E3C34C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF93E82F-D38C-4D4D-99EB-E334EE163C4E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_cloud:4.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3471D34-A76C-498A-8C45-1553A579A88B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "99E5F378-E93E-45F6-A445-F2DAB5C423F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_device:4.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9538F63-3DC9-42CC-87D5-3CA048AE52A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0003813A-C1A8-4ED1-A04C-7AE961E7FA22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-iq_security:4.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEC1A702-0CCB-48F9-A42E-D8C756DD9D76"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.securitytracker.com/id/1033334" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://support.f5.com/kb/en-us/solutions/public/17000/000/sol17047.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-11-23 01:05:45 +00:00
} ,
{
"url" : "http://www.securitytracker.com/id/1033334" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://support.f5.com/kb/en-us/solutions/public/17000/000/sol17047.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}