René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

263 lines
10 KiB
JSON

{
"id": "CVE-2021-23049",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2021-09-14T13:15:11.033",
"lastModified": "2021-09-24T15:02:51.520",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On BIG-IP version 16.0.x before 16.0.1.2 and 15.1.x before 15.1.3, when the iRules RESOLVER::summarize command is used on a virtual server, undisclosed requests can cause an increase in Traffic Management Microkernel (TMM) memory utilization resulting in an out-of-memory condition and a denial-of-service (DoS). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
},
{
"lang": "es",
"value": "En BIG-IP versiones 16.0.x anteriores a 16.0.1.2 y versiones 15.1.x anteriores a 15.1.3, cuando es usado el comando iRules RESOLVER::summarize en un servidor virtual, las peticiones no divulgadas pueden causar un aumento en el uso de la memoria del Traffic Management Microkernel (TMM), resultando en una condici\u00f3n de falta de memoria y una denegaci\u00f3n de servicio (DoS). Nota: Las versiones de software que han alcanzado End of Technical Support (EoTS) no son evaluadas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "f5sirt@f5.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "5F04F2FB-12C2-4BC4-AFBB-9DA82E53D7EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "C7D3DE51-EAA0-427D-8991-F2D9449F6F99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "FA17368C-7B1F-4B73-8296-3FC2656C0F04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "E0B33987-329F-4C8E-948C-C797199E3D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "55E9A0EB-8118-400B-B901-80A8AAFC212F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "633F777A-10B4-42B6-867C-FC32E38A4B1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "3EC583B6-59E2-431B-A574-0A700F5713A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "0EBE11A9-0ACA-44E3-A15D-BDD8B7CEC107"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "06D8F5CC-FD05-42EA-A3F2-49BB4A5009F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "53C5B43F-C4E5-481B-B909-55473427F62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "23CFD951-1C6F-4EE5-B8AA-06F29744F082"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "CE26ED82-4D38-4165-990D-4967AE130059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "E2E2832C-0C5D-4051-A85B-162C5BF11DEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "81FB0566-9B8D-489D-B27A-44478903E284"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "247A56A6-5486-49C4-88B1-4251337044AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "64E83F71-D91E-425A-B8F1-5E1790F2B30E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "9E599573-DAE5-4481-9BA0-7796D7101E67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "00210DD6-894D-4E43-A7B6-D3B6D508E037"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "D67E4394-E1CC-4492-95E7-DCDA13049517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "8CCAFD36-1E86-4DC2-914E-EE32B8ED387D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.3",
"matchCriteriaId": "1B6F6F41-B775-4A79-8284-C7BE0DA49DAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0.0",
"versionEndExcluding": "16.0.1.2",
"matchCriteriaId": "4F27D8D5-71EA-4FB0-A9A7-410BF1DEF68C"
}
]
}
]
}
],
"references": [
{
"url": "https://support.f5.com/csp/article/K65397301",
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
]
}
]
}