First published: Wed Nov 22 2017(Updated: )
In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP AFM | >=12.0.0<=12.1.1 | |
F5 BIG-IP Analytics | >=12.0.0<=12.1.1 | |
F5 BIG-IP APM | >=12.0.0<=12.1.1 | |
f5 big-ip application acceleration manager | >=12.0.0<=12.1.1 | |
F5 BIG-IP Advanced WAF/ASM | >=12.0.0<=12.1.1 | |
F5 BIG-IP DNS | >=12.0.0<=12.1.1 | |
f5 big-ip link controller | >=12.0.0<=12.1.1 | |
F5 BIG-IP Local Traffic Manager | >=12.0.0<=12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=12.0.0<=12.1.1 | |
F5 WebSafe | >=12.0.0<=12.1.1 | |
F5 LineRate | >=2.5.0<=2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6166 is a vulnerability that affects BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software versions 12.0.0 to 12.1.1.
The severity of CVE-2017-6166 is medium, with a severity value of 5.9.
CVE-2017-6166 may cause the Traffic Management Microkernel (TMM) to crash when processing fragmented packets.
CVE-2017-6166 affects the following components: BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software versions 12.0.0 to 12.1.1.
Yes, F5 has released a patch to fix CVE-2017-6166. Please refer to the F5 support article for more information.