F5.BIG.IP.TMM.URI.Normalization.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in F5 BIG-IP Traffic Management Microkernel (TMM).
The vulnerability is due to an input validation error when normalizing invalid IPv6 hostnames. A remote attacker may be able to exploit this to execute arbitrary code or lead to a denial of service condition within the context of the application, via a crafted HTTP request.
Affected Products
BIG-IP 16.0.0-16.0.1
BIG-IP 15.1.0-15.1.2
BIG-IP 14.1.0-14.1.3
BIG-IP 13.1.0-13.1.3
BIG-IP 12.1.0-12.1.5
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://support.f5.com/csp/article/K56715231
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-04-01 | 18.050 | Default_action:pass:drop |
2021-03-22 | 18.042 | Sig Added |
2021-03-17 | 18.039 | |
2021-03-17 | 18.038 | |
2021-03-17 | 18.037 |