CVE-2009-4420
Published Dec 24, 2009
Last updated 5 years ago
Overview
- Description
- Buffer overflow in the bd daemon in F5 Networks BIG-IP Application Security Manager (ASM) 9.4.4 through 9.4.7 and 10.0.0 through 10.0.1, and Protocol Security Manager (PSM) 9.4.5 through 9.4.7 and 10.0.0 through 10.0.1, allows remote attackers to cause a denial of service (crash) via unknown vectors. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2691943C-1FD1-43EE-B070-E35710E426ED" }, { "criteria": "cpe:2.3:h:f5:big-ip_application_security_manager:9.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEABC433-37BD-4A53-A872-92564807F022" }, { "criteria": "cpe:2.3:h:f5:big-ip_application_security_manager:9.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "409B66AC-292F-426D-A908-D6D865A25CA8" }, { "criteria": "cpe:2.3:h:f5:big-ip_application_security_manager:9.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEAA4B9A-B1FB-4273-A0B3-A69F49D940D8" }, { "criteria": "cpe:2.3:h:f5:big-ip_application_security_manager:9.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44D22108-C65D-4BB4-8141-B05F053863BD" }, { "criteria": "cpe:2.3:h:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B42FE789-9F15-4450-B1B8-7D2A044A26A8" }, { "criteria": "cpe:2.3:h:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B598A78-EF2C-461F-844E-84B0971A2F5D" }, { "criteria": "cpe:2.3:h:f5:big-ip_protocol_security_manager:9.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AE2CC21-3B8B-443B-A427-482B8A9D80DD" }, { "criteria": "cpe:2.3:h:f5:big-ip_protocol_security_manager:9.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50191BEE-7001-43DC-8AEE-01E233594752" }, { "criteria": "cpe:2.3:h:f5:big-ip_protocol_security_manager:9.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "178C7BDD-639E-4472-BEDE-9187CD50DA4F" }, { "criteria": "cpe:2.3:h:f5:big-ip_protocol_security_manager:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B38707-9BD0-4E41-93A4-CCDDF1E8BC73" } ], "operator": "OR" } ] } ]