First published: Fri Sep 18 2015(Updated: )
The FastL4 virtual server in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.3.0 through 11.5.2 and 11.6.0 through 11.6.0 HF4, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.2.1 through 11.3.0, and BIG-IP PSM 11.2.1 through 11.4.1 allows remote attackers to cause a denial of service (Traffic Management Microkernel restart) via a fragmented packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Advanced Firewall Manager | =11.3.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.2 | |
F5 BIG-IP Advanced Firewall Manager | =11.6.0 | |
F5 BIG-IP Analytics | =11.3.0 | |
F5 BIG-IP Analytics | =11.4.0 | |
F5 BIG-IP Analytics | =11.4.1 | |
F5 BIG-IP Analytics | =11.5.0 | |
F5 BIG-IP Analytics | =11.5.1 | |
F5 BIG-IP Analytics | =11.5.2 | |
F5 BIG-IP Analytics | =11.6.0 | |
F5 BIG-IP Application Security Manager | =11.3.0 | |
F5 BIG-IP Application Security Manager | =11.4.0 | |
F5 BIG-IP Application Security Manager | =11.4.1 | |
F5 BIG-IP Application Security Manager | =11.5.0 | |
F5 BIG-IP Application Security Manager | =11.5.1 | |
F5 BIG-IP Application Security Manager | =11.5.2 | |
F5 BIG-IP Application Security Manager | =11.6.0 | |
F5 BIG-IP Edge Gateway | =11.2.1 | |
F5 BIG-IP Edge Gateway | =11.3.0 | |
F5 BIG-IP Global Traffic Manager | =11.3.0 | |
F5 BIG-IP Global Traffic Manager | =11.4.0 | |
F5 BIG-IP Global Traffic Manager | =11.4.1 | |
F5 BIG-IP Global Traffic Manager | =11.5.0 | |
F5 BIG-IP Global Traffic Manager | =11.5.1 | |
F5 BIG-IP Global Traffic Manager | =11.5.2 | |
F5 BIG-IP Global Traffic Manager | =11.6.0 | |
f5 big-ip link controller | =11.3.0 | |
f5 big-ip link controller | =11.4.0 | |
f5 big-ip link controller | =11.4.1 | |
f5 big-ip link controller | =11.5.0 | |
f5 big-ip link controller | =11.5.1 | |
f5 big-ip link controller | =11.5.2 | |
f5 big-ip link controller | =11.6.0 | |
F5 BIG-IP Local Traffic Manager | =11.3.0 | |
F5 BIG-IP Local Traffic Manager | =11.4.0 | |
F5 BIG-IP Local Traffic Manager | =11.4.1 | |
F5 BIG-IP Local Traffic Manager | =11.5.0 | |
F5 BIG-IP Local Traffic Manager | =11.5.1 | |
F5 BIG-IP Local Traffic Manager | =11.5.2 | |
F5 BIG-IP Local Traffic Manager | =11.6.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.3.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.2 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.0 | |
F5 BIG-IP Protocol Security Manager | =11.2.1 | |
F5 BIG-IP Protocol Security Manager | =11.3.0 | |
F5 BIG-IP Protocol Security Manager | =11.4.0 | |
F5 BIG-IP Protocol Security Manager | =11.4.1 | |
F5 BIG-IP WebAccelerator | =11.2.1 | |
F5 BIG-IP WebAccelerator | =11.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4638 is classified as a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2015-4638, upgrade affected F5 BIG-IP software to versions that contain the necessary security patches.
CVE-2015-4638 affects multiple products including F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, and others in specified versions.
Yes, CVE-2015-4638 can be exploited remotely by attackers, potentially leading to serious security breaches.
There are no effective workarounds documented for CVE-2015-4638, making it crucial to apply updates as soon as feasible.