CVE-2015-5058
Published Aug 24, 2015
Last updated 9 years ago
Overview
- Description
- Memory leak in the virtual server component in F5 Big-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.5.x before 11.5.1 HF10, 11.5.3 before HF1, and 11.6.0 before HF5, BIG-IQ Cloud, Device, and Security 4.4.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted ICMP packets.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC6C5628-14FF-4D75-B62E-D4B2707C1E3D" }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCF94129-8779-4D68-8DD4-B828CA633746" }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFA77C6B-72DB-4D57-87CF-11F2C7EDB828" }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA244A7D-F65D-4114-81C8-CE811959EA10" }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96CF015E-C74B-4215-9103-8087BC1D12AB" }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B276E4DF-69FC-4158-B93A-781A45605034" }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B33B2082-E040-4799-A260-BA687ED8614E" }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2E93EE3-DB73-468E-87CA-4D277F283648" }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4489382-0668-4CFB-BA89-D54762937CEE" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "281D0B5B-27DF-4E8A-AFC9-D09468F8ECDF" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5B40837-EC2B-41FB-ACC3-806054EAF28C" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "855E91A4-0A0C-4E5C-8019-FB513A793803" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8923BB93-96C1-417B-9172-4A81E731EBA2" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "475F0EF8-42CB-4099-9C4A-390F946C4924" }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B50BF19F-71B4-47C0-A96E-6EB90FCC6AE7" }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "202B6870-718C-4F8D-9BAB-7ED6385BF2A7" }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7D7863D-B064-4D7A-A66B-C3D3523425FD" }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB017D7A-3290-4EF5-9647-B488771A5F32" }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC0F5FD3-45E7-4D55-A3AC-6572FC0682D0" }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CDEC701-DAB3-4D92-AA67-B886E6693E46" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F86EB5-D581-4103-A802-44D968BA8D55" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0" }, { "criteria": "cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9768142-C554-44DE-B8D5-45CB51E3C34C" }, { "criteria": "cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF93E82F-D38C-4D4D-99EB-E334EE163C4E" }, { "criteria": "cpe:2.3:a:f5:big-iq_cloud:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3471D34-A76C-498A-8C45-1553A579A88B" }, { "criteria": "cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99E5F378-E93E-45F6-A445-F2DAB5C423F7" }, { "criteria": "cpe:2.3:a:f5:big-iq_device:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9538F63-3DC9-42CC-87D5-3CA048AE52A6" }, { "criteria": "cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0003813A-C1A8-4ED1-A04C-7AE961E7FA22" }, { "criteria": "cpe:2.3:a:f5:big-iq_security:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEC1A702-0CCB-48F9-A42E-D8C756DD9D76" } ], "operator": "OR" } ] } ]