F5.BIG.IP.ASM.HTTP.Response.Header.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in F5 BIG-IP Application Security Manager.
The vulnerability is due to an input validation error when the vulnerable software handles a maliciously crafted HTTP Response. A remote attacker may be able to exploit this to execute arbitrary code or lead to a denial of service condition within the context of the application, via a crafted HTTP response.
Affected Products
BIG-IP (Advanced WAF and ASM) 16.0.0-16.0.1
BIG-IP (Advanced WAF and ASM) 15.1.0-15.1.2
BIG-IP (Advanced WAF and ASM) 14.1.0-14.1.3
BIG-IP (Advanced WAF and ASM) 13.1.0-13.1.3
BIG-IP (Advanced WAF and ASM) 12.1.0-12.1.5
BIG-IP (Advanced WAF and ASM) 11.6.1-11.6.5
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://support.f5.com/csp/article/K52510511
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-04-06 | 18.052 | Default_action:pass:drop |
2021-03-25 | 18.046 | Sig Added |
2021-03-23 | 18.043 |