F5.BIG.IP.ASM.HTTP.Response.Header.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in F5 BIG-IP Application Security Manager.
The vulnerability is due to an input validation error when the vulnerable software handles a maliciously crafted HTTP Response. A remote attacker may be able to exploit this to execute arbitrary code or lead to a denial of service condition within the context of the application, via a crafted HTTP response.

affected-products-logoAffected Products

BIG-IP (Advanced WAF and ASM) 16.0.0-16.0.1
BIG-IP (Advanced WAF and ASM) 15.1.0-15.1.2
BIG-IP (Advanced WAF and ASM) 14.1.0-14.1.3
BIG-IP (Advanced WAF and ASM) 13.1.0-13.1.3
BIG-IP (Advanced WAF and ASM) 12.1.0-12.1.5
BIG-IP (Advanced WAF and ASM) 11.6.1-11.6.5

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.
Denial of Service: Remote attackers can crash vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://support.f5.com/csp/article/K52510511

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-04-06 18.052 Default_action:pass:drop
2021-03-25 18.046 Sig Added
2021-03-23 18.043