fkie_cve-2019-6594
Vulnerability from fkie_nvd
Published
2019-02-26 15:29
Modified
2024-11-21 04:46
Severity ?
Summary
On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances.
References
▶ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K91026261 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K91026261 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4309DD94-5A77-4EA5-8274-8B3A40EA988C", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D00A37D-91A8-4E53-ABDE-4974A35D7086", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F9121E6-F95C-4769-80BA-B7E4D9CB0003", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E021297A-FD19-446B-B526-7516503B6D24", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "BFC27A9D-8CB6-4F0C-99DD-B3E6AF50988C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "CAA88743-F96D-4847-8DE4-3AF021717F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "FCC68160-D34C-4F0C-8BC6-5573DE3A6540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "436A8B39-E1D3-404F-832C-8436C931CD50", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D304C74-1F9B-4AD9-9FE9-89E98A12C220", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "774E9A46-F20E-499B-9FE3-F75D2F6CFF41", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A526B1-EB66-497F-B8B5-45205781B323", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "5440C4FC-B9A1-4744-B4C8-92F66DCCAC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "69F38B91-D03F-47BC-9BFF-D4298856D843", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "3F45771D-8B62-40E8-B83F-A0F46B04A18D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F71DF92-DDF3-4E39-85CE-D364C0C2AA8B", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8520B2C-8220-41D6-B61D-30F32468388A", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "12EB0BB9-FC16-4B27-B30D-3D9A8492A319", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9032E773-CAB2-4108-A86B-04A8383663BE", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "018F7F5E-FE99-4981-9269-4D68FD405F20", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "CED0E0B4-4D66-4393-8189-24A6A9F0E08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "6F54D389-CFFB-42F4-B8C6-FE3BB4888DA4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F66CAC0-20E9-48FB-A818-024D609F35AF", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "F504BF44-EC6D-4FFD-A530-61052E2365A7", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "204F9C52-757E-4094-AA29-A80B218AD6AB", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "224F2348-19DC-4242-8A1E-5F5BDCB86B9C", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "80111371-B4E7-4D23-9818-0E2CC4C0F263", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "53A3F28E-E10C-40B2-8285-BAE28375DFB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "110FBBEB-33E3-4A77-9EBF-86C9B45B864D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B011EE60-2B1C-4901-BF9B-13AFB7DAE1A6", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D00A37D-91A8-4E53-ABDE-4974A35D7086", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B4AB82F-D598-41CB-95A1-9D4CA445E806", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E021297A-FD19-446B-B526-7516503B6D24", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "BFC27A9D-8CB6-4F0C-99DD-B3E6AF50988C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "CAA88743-F96D-4847-8DE4-3AF021717F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "FCC68160-D34C-4F0C-8BC6-5573DE3A6540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC94D1AE-7664-4C83-A84F-34CF5E0CA15F", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF3398F2-F6EC-497E-AC76-3C5F4C3607CE", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18ED4-C6D5-4821-A1BA-ADE51B33A3D8", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3A77A-89E0-44DF-AA5B-EDEBCBB63060", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "7686C88A-9520-4C4A-A602-BDE1F4F72048", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "5AC91766-79AD-4A8F-BCF2-5D252FC375D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "4B3E1662-39AF-42C0-A6E6-2C9579B7EEE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA8A7544-B6DB-4CD8-8C49-CF16B3526682", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "1ACE2C94-6D93-4245-9BDF-237AC74C669D", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAD7E2CC-977C-4C63-AC72-78C7F4D7EF40", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D11EBE7-741F-4585-962F-99EAA29C1F0E", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "01581EF5-A132-427B-A6A5-42A4BE28BE06", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "B59BFDDD-52DE-4062-B18E-F55B1C1A55D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "6180B193-3D37-448E-B3A5-A2DA35D7E931", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF6F1F33-2617-4AB5-B269-DCB5B322CC08", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BC587AF-FB81-444D-A0FE-55070F9463DF", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D44FD4-D7A0-42AA-86B5-DB371BD31EFB", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "57F6C963-A1BF-4579-9345-D0207269577A", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "F9B29141-C15B-4BCD-897B-91944D36BDBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "718C5B91-72D2-46A0-A1F6-CF9E0F48D440", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "3747014F-F4DE-4D6E-80C7-C0C609D07D60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9C58E9E-8937-4657-A69E-A63CBE423CC7", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "146A0E0F-B2F2-4362-9CBD-8183977883B2", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "F941BFBA-7961-4F5D-B6CF-7DAE8B1B3AAA", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC6B989A-BA55-47F5-8269-D9FA435ECC29", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "059B6601-24F0-4212-907B-D9CD7331BDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "93526E30-BEB1-40E3-A99D-ABDBA9AD7B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "6C363226-7034-435E-B5A3-E00924C4CA8F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B74523D-BC99-47F0-8C5F-8C56DF55504C", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E96D0D-2C7D-4357-AE91-9B00FF7D2D0B", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "39EAE8EF-4426-4584-8877-EC94C3923A97", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F534EADF-DA49-4EDD-97F8-C4046E890D8B", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "FB56A3A2-4985-4A68-A6BD-4ACDD6FA7B88", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "1EAF1DB5-52DD-47DF-A281-A338F989735E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "2045D85E-2BAF-4777-8957-6CBB0C48AF51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA48C9-68B1-430A-A319-F38002098B9A", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "49B3D9A1-B592-4C82-8A7E-D6496A2A153F", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE834D83-C9A9-43D5-80F3-6DA2CA922751", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0233F1B-2DDB-4B01-A549-E76C18BBC3F1", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "1AEE107A-9863-4143-A2B5-0DD773C08BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "58B46D9A-38A0-4923-A44E-A89223B996CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "0DA447DF-9298-4BE2-92CE-228640DC0815", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "82811221-46E5-419A-A6BC-E9DA655DCC70", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "16AF7AF3-F7CB-4BAA-A0D0-179714D094BF", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B115D7E-C099-493C-8753-8CBC3823F5B9", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "90DBE74F-6E43-448F-9479-8FD75D5DCC22", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "60DC4E85-BC88-499F-B1C2-E2572784294C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "F4E706BC-8474-49DF-B44F-4480128FDFE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "674D7BB1-C6F0-4D35-BFDF-D02F7167A0A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F787946-AEDC-47A4-9DA0-5947992EEC16", "versionEndIncluding": "11.6.3.2", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA5624FE-69E7-41C3-9F84-07827D590A52", "versionEndIncluding": "12.1.3.7", "versionStartIncluding": "12.1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD9DACFB-B553-498E-A6C1-37CBFE5746B1", "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6ADE585-616C-4B40-A40C-EE97A8FAC653", "versionEndIncluding": "14.0.0.2", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf1:*:*:*:*:*:*", "matchCriteriaId": "1544EB26-7E41-44D1-A6E5-444B29E1A17C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf2:*:*:*:*:*:*", "matchCriteriaId": "7A83FBD1-675E-42F4-BBD2-47AD962D8587", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf3:*:*:*:*:*:*", "matchCriteriaId": "B02A0DEF-BAD9-402B-85D9-451A4A708B48", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances." }, { "lang": "es", "value": "BIG-IP, en sus versiones 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1 y 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP), no protege contra manera correcta contra m\u00faltiples DATA_FIN de longitud cero en la cola de reensamblado, lo que podr\u00eda conducir a un bucle infinito en algunas circunstancias." } ], "id": "CVE-2019-6594", "lastModified": "2024-11-21T04:46:46.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-26T15:29:00.323", "references": [ { "source": "f5sirt@f5.com", "tags": [ "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K91026261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K91026261" } ], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…