First published: Thu Feb 09 2017(Updated: )
A BIG-IP virtual server configured with a Client SSL profile that has the non-default Session Tickets option enabled may leak up to 31 bytes of uninitialized memory. A remote attacker may exploit this vulnerability to obtain Secure Sockets Layer (SSL) session IDs from other sessions. It is possible that other data from uninitialized memory may be returned as well.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | =11.4.0 | |
Riverbed SteelApp Traffic Manager | =11.4.1 | |
Riverbed SteelApp Traffic Manager | =11.5.0 | |
Riverbed SteelApp Traffic Manager | =11.5.1 | |
Riverbed SteelApp Traffic Manager | =11.5.2 | |
Riverbed SteelApp Traffic Manager | =11.5.3 | |
Riverbed SteelApp Traffic Manager | =11.5.4 | |
Riverbed SteelApp Traffic Manager | =11.6.0 | |
Riverbed SteelApp Traffic Manager | =11.6.1 | |
Riverbed SteelApp Traffic Manager | =12.0.0 | |
Riverbed SteelApp Traffic Manager | =12.1.0 | |
Riverbed SteelApp Traffic Manager | =12.1.1 | |
Riverbed SteelApp Traffic Manager | =12.1.2 | |
F5 BIG-IP Application Acceleration Manager | =11.4.0 | |
F5 BIG-IP Application Acceleration Manager | =11.4.1 | |
F5 BIG-IP Application Acceleration Manager | =11.5.0 | |
F5 BIG-IP Application Acceleration Manager | =11.5.1 | |
F5 BIG-IP Application Acceleration Manager | =11.5.2 | |
F5 BIG-IP Application Acceleration Manager | =11.5.3 | |
F5 BIG-IP Application Acceleration Manager | =11.5.4 | |
F5 BIG-IP Application Acceleration Manager | =11.6.0 | |
F5 BIG-IP Application Acceleration Manager | =11.6.1 | |
F5 BIG-IP Application Acceleration Manager | =12.0.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.1 | |
F5 BIG-IP Application Acceleration Manager | =12.1.2 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.2 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.3 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.4 | |
F5 BIG-IP Advanced Firewall Manager | =11.6.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.6.1 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.2 | |
F5 BIG-IP Analytics | =11.4.0 | |
F5 BIG-IP Analytics | =11.4.1 | |
F5 BIG-IP Analytics | =11.5.0 | |
F5 BIG-IP Analytics | =11.5.1 | |
F5 BIG-IP Analytics | =11.5.2 | |
F5 BIG-IP Analytics | =11.5.3 | |
F5 BIG-IP Analytics | =11.5.4 | |
F5 BIG-IP Analytics | =11.6.0 | |
F5 BIG-IP Analytics | =11.6.1 | |
F5 BIG-IP Analytics | =12.0.0 | |
F5 BIG-IP Analytics | =12.1.0 | |
F5 BIG-IP Analytics | =12.1.1 | |
F5 BIG-IP Analytics | =12.1.2 | |
F5 Access Policy Manager | =11.4.0 | |
F5 Access Policy Manager | =11.4.1 | |
F5 Access Policy Manager | =11.5.0 | |
F5 Access Policy Manager | =11.5.1 | |
F5 Access Policy Manager | =11.5.2 | |
F5 Access Policy Manager | =11.5.3 | |
F5 Access Policy Manager | =11.5.4 | |
F5 Access Policy Manager | =11.6.0 | |
F5 Access Policy Manager | =11.6.1 | |
F5 Access Policy Manager | =12.0.0 | |
F5 Access Policy Manager | =12.1.0 | |
F5 Access Policy Manager | =12.1.1 | |
F5 Access Policy Manager | =12.1.2 | |
F5 Application Security Manager | =11.4.0 | |
F5 Application Security Manager | =11.4.1 | |
F5 Application Security Manager | =11.5.0 | |
F5 Application Security Manager | =11.5.1 | |
F5 Application Security Manager | =11.5.2 | |
F5 Application Security Manager | =11.5.3 | |
F5 Application Security Manager | =11.5.4 | |
F5 Application Security Manager | =11.6.0 | |
F5 Application Security Manager | =11.6.1 | |
F5 Application Security Manager | =12.0.0 | |
F5 Application Security Manager | =12.1.0 | |
F5 Application Security Manager | =12.1.1 | |
F5 Application Security Manager | =12.1.2 | |
Riverbed SteelApp Traffic Manager | =11.4.0 | |
Riverbed SteelApp Traffic Manager | =11.4.1 | |
Riverbed SteelApp Traffic Manager | =11.5.0 | |
Riverbed SteelApp Traffic Manager | =11.5.1 | |
Riverbed SteelApp Traffic Manager | =11.5.2 | |
Riverbed SteelApp Traffic Manager | =11.5.3 | |
Riverbed SteelApp Traffic Manager | =11.5.4 | |
Riverbed SteelApp Traffic Manager | =11.6.0 | |
Riverbed SteelApp Traffic Manager | =11.6.1 | |
F5 BIG-IP Link Controller | =11.4.0 | |
F5 BIG-IP Link Controller | =11.4.1 | |
F5 BIG-IP Link Controller | =11.5.0 | |
F5 BIG-IP Link Controller | =11.5.1 | |
F5 BIG-IP Link Controller | =11.5.2 | |
F5 BIG-IP Link Controller | =11.5.3 | |
F5 BIG-IP Link Controller | =11.5.4 | |
F5 BIG-IP Link Controller | =11.6.0 | |
F5 BIG-IP Link Controller | =11.6.1 | |
F5 BIG-IP Link Controller | =12.0.0 | |
F5 BIG-IP Link Controller | =12.1.0 | |
F5 BIG-IP Link Controller | =12.1.1 | |
F5 BIG-IP Link Controller | =12.1.2 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.2 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.3 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.4 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.2 | |
F5 BIG-IP Protocol Security Manager | =11.4.0 | |
F5 BIG-IP Protocol Security Manager | =11.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9244 has a medium severity rating due to the potential for information disclosure.
To fix CVE-2016-9244, upgrade to a patched version of F5 BIG-IP that disables the non-default Session Tickets option.
CVE-2016-9244 affects F5 BIG-IP software versions 11.4.0 through 12.1.2.
CVE-2016-9244 is an information disclosure vulnerability that may allow remote attackers to obtain SSL session IDs.
Yes, CVE-2016-9244 can be exploited remotely by attackers to leak session data.