Product:

Big\-Ip_ltm

(F5)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2017-11-22 CVE-2017-6166 In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device. Big\-Ip_afm, Big\-Ip_analytics, Big\-Ip_apm, Big\-Ip_application_acceleration_manager, Big\-Ip_asm, Big\-Ip_dns, Big\-Ip_link_controller, Big\-Ip_ltm, Big\-Ip_pem, F5_websafe, Linerate 5.9
2017-11-17 CVE-2017-6168 On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself,... Big\-Ip_afm, Big\-Ip_analytics, Big\-Ip_apm, Big\-Ip_application_acceleration_manager, Big\-Ip_asm, Big\-Ip_link_controller, Big\-Ip_ltm, Big\-Ip_pem, Websafe 7.4