First published: Tue Jan 31 2017(Updated: )
An undisclosed traffic pattern received by a BIG-IP Virtual Server with TCP Fast Open enabled may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS).
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | =12.0.0 | |
Riverbed SteelApp Traffic Manager | =12.1.0 | |
Riverbed SteelApp Traffic Manager | =12.1.1 | |
F5 BIG-IP Application Acceleration Manager | =12.0.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.1 | |
F5 BIG-IP Analytics | =12.0.0 | |
F5 BIG-IP Analytics | =12.1.0 | |
F5 BIG-IP Analytics | =12.1.1 | |
F5 Access Policy Manager | =12.0.0 | |
F5 Access Policy Manager | =12.1.0 | |
F5 Access Policy Manager | =12.1.1 | |
F5 Application Security Manager | =12.0.0 | |
F5 Application Security Manager | =12.1.0 | |
F5 Application Security Manager | =12.1.1 | |
F5 BIG-IP | =12.0.0 | |
F5 BIG-IP | =12.1.0 | |
F5 BIG-IP | =12.1.1 | |
F5 BIG-IP Link Controller | =12.0.0 | |
F5 BIG-IP Link Controller | =12.1.0 | |
F5 BIG-IP Link Controller | =12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.1 | |
F5 WebSafe | =12.0.0 | |
F5 WebSafe | =12.1.0 | |
F5 WebSafe | =12.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9249 has a severity rating that indicates it can lead to Denial-of-Service (DoS) if exploited.
To fix CVE-2016-9249, you should upgrade to the latest version of F5 BIG-IP software that addresses this vulnerability.
CVE-2016-9249 affects various versions of F5 BIG-IP Local Traffic Manager, Application Security Manager, and other modules as specified in the vulnerability report.
Yes, CVE-2016-9249 can potentially be exploited remotely through specific traffic patterns targeting the BIG-IP Virtual Server.
The potential impact of CVE-2016-9249 includes service disruption due to the Traffic Management Microkernel restarting, resulting in Denial-of-Service.