First published: Wed Oct 31 2018(Updated: )
In BIG-IP 14.0.0-14.0.0.2, 13.1.0.4-13.1.1.1, or 12.1.3.4-12.1.3.6, If an MPTCP connection receives an abort signal while the initial flow is not the primary flow, the initial flow will remain after the closing procedure is complete. TMM may restart and produce a core file as a result of this condition.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Local Traffic Manager | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Local Traffic Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Local Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.3.4<=12.1.3.6 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Application Acceleration Manager | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Application Acceleration Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Application Acceleration Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=12.1.3.4<=12.1.3.6 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Access Policy Manager | >=12.1.3.4<=12.1.3.6 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Protocol Security Module | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Protocol Security Module | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Protocol Security Module | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Domain Name System | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Domain Name System | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Domain Name System | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Edge Gateway | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Edge Gateway | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Edge Gateway | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Fraud Protection Service | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Fraud Protection Service | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Fraud Protection Service | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Global Traffic Manager | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Global Traffic Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Global Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Link Controller | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Link Controller | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Link Controller | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Policy Enforcement Manager | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Policy Enforcement Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Policy Enforcement Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Webaccelerator | >=12.1.3.4<=12.1.3.6 | |
F5 Big-ip Webaccelerator | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Webaccelerator | >=14.0.0<=14.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15318 is a vulnerability in BIG-IP versions 14.0.0-14.0.0.2, 13.1.0.4-13.1.1.1, or 12.1.3.4-12.1.3.6 that could allow an attacker to cause a restart of the Traffic Management Microkernel (TMM) and create a core file.
CVE-2018-15318 has a severity rating of 7.5 out of 10, which is considered high.
CVE-2018-15318 affects BIG-IP Local Traffic Manager (versions 12.1.3.4-12.1.3.6, 13.1.0.4-13.1.1.1, and 14.0.0-14.0.0.2), BIG-IP Advanced Firewall Manager (versions 12.1.3.4-12.1.3.6, 13.1.0.4-13.1.1.1, and 14.0.0-14.0.0.2), and other related software.
To fix CVE-2018-15318, it is recommended to upgrade to a version of BIG-IP software that includes a fix for the vulnerability.
More information about CVE-2018-15318 can be found in the F5 support article: https://support.f5.com/csp/article/K16248201