First published: Wed Nov 22 2017(Updated: )
In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Afm | >=12.0.0<=12.1.1 | |
F5 BIG-IP Analytics | >=12.0.0<=12.1.1 | |
F5 BIG-IP APM | >=12.0.0<=12.1.1 | |
F5 Big-ip Application Acceleration Manager | >=12.0.0<=12.1.1 | |
F5 Big-ip Asm | >=12.0.0<=12.1.1 | |
F5 Big-ip Dns | >=12.0.0<=12.1.1 | |
F5 Big-ip Link Controller | >=12.0.0<=12.1.1 | |
F5 Big-ip Ltm | >=12.0.0<=12.1.1 | |
F5 Big-ip Pem | >=12.0.0<=12.1.1 | |
F5 F5 Websafe | >=12.0.0<=12.1.1 | |
F5 Linerate | >=2.5.0<=2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6166 is a vulnerability that affects BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software versions 12.0.0 to 12.1.1.
The severity of CVE-2017-6166 is medium, with a severity value of 5.9.
CVE-2017-6166 may cause the Traffic Management Microkernel (TMM) to crash when processing fragmented packets.
CVE-2017-6166 affects the following components: BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software versions 12.0.0 to 12.1.1.
Yes, F5 has released a patch to fix CVE-2017-6166. Please refer to the F5 support article for more information.