First published: Tue Feb 06 2018(Updated: )
In versions 13.0.0, 12.0.0-12.1.3, or 11.6.0-11.6.2, an F5 BIG-IP virtual server using the URL categorization feature may cause the Traffic Management Microkernel (TMM) to produce a core file when it receives malformed URLs during categorization.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Policy Enforcement Manager | =11.6.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.2 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.2 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.3 | |
F5 BIG-IP Policy Enforcement Manager | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6169 is rated as a medium severity vulnerability.
To fix CVE-2017-6169, you should upgrade the F5 BIG-IP Policy Enforcement Manager to a version that is not affected, specifically after 12.1.3.
CVE-2017-6169 affects F5 BIG-IP versions 11.6.0 through 11.6.2, 12.0.0, 12.1.0 through 12.1.3, and 13.0.0.
CVE-2017-6169 can cause the Traffic Management Microkernel (TMM) to crash and produce a core file when processing malformed URLs.
There are no specific workarounds for CVE-2017-6169 other than upgrading to a non-vulnerable version.