René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

183 lines
6.6 KiB
JSON

{
"id": "CVE-2020-27721",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2020-12-24T15:15:12.763",
"lastModified": "2020-12-28T18:42:34.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In versions 16.0.0-16.0.0.1, 15.1.0-15.1.1, 14.1.0-14.1.3, 13.1.0-13.1.3.5, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, in a BIG-IP DNS / BIG-IP LTM GSLB deployment, under certain circumstances, the BIG-IP DNS system may stop using a BIG-IP LTM virtual server for DNS response."
},
{
"lang": "es",
"value": "En las versiones 16.0.0-16.0.0.1, 15.1.0-15.1.1, 14.1.0-14.1.3, 13.1.0-13.1.3.5, 12.1.0-12.1.5.2 y 11.6.1-11.6.5.2 , en una implementaci\u00f3n de BIG-IP DNS / BIG-IP LTM GSLB, bajo determinadas circunstancias, el sistema BIG-IP DNS puede dejar de usar un servidor virtual BIG-IP LTM para la respuesta de DNS"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.6.1",
"versionEndIncluding": "11.6.5",
"matchCriteriaId": "8376922B-0D04-4E5D-BADE-0D6AC23A4696"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.5",
"matchCriteriaId": "55C2EC23-E78F-4447-BACF-21FC36ABF155"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.3",
"matchCriteriaId": "A35AC237-573B-4309-87EF-3945FA2449BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndExcluding": "14.1.3.1",
"matchCriteriaId": "95CD946B-331A-44F5-8F64-26411E909F13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0.0",
"versionEndExcluding": "15.1.2",
"matchCriteriaId": "363C0C5C-A8EE-4BF9-92E3-506DA88D8CD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1",
"matchCriteriaId": "B7466098-C689-4E4B-879F-0433A020FDBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.6.1",
"versionEndIncluding": "11.6.5",
"matchCriteriaId": "CD3D5803-35A0-4FF7-9AD3-E345C53A18FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.5",
"matchCriteriaId": "EB5007D0-BBDB-4D74-9C88-98FBA74757D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.3",
"matchCriteriaId": "FB07E847-6083-4CC8-8A62-6B9744B87088"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndExcluding": "14.1.3.1",
"matchCriteriaId": "AD6C7A28-1569-44B0-BE80-7472F5ED5059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0.0",
"versionEndExcluding": "15.1.2",
"matchCriteriaId": "AD2FDEB1-EB0E-4329-ABCF-A9FFF6FD0523"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1",
"matchCriteriaId": "EB7047B3-A248-424C-98D8-A0DD99A86F50"
}
]
}
]
}
],
"references": [
{
"url": "https://support.f5.com/csp/article/K52035247",
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
]
}
]
}