First published: Thu Mar 28 2019(Updated: )
On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, and 12.0.x, an undisclosed sequence of packets received by an SSL virtual server and processed by an associated Client SSL or Server SSL profile may cause a denial of service.
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=11.5.0<11.5.9 | |
F5 BIG-IP Access Policy Manager | >=11.6.0<11.6.4 | |
F5 BIG-IP Access Policy Manager | >=12.0.0<12.1.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.0<11.5.9 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.0<11.6.4 | |
F5 BIG-IP Advanced Firewall Manager | >=12.0.0<12.1.0 | |
F5 Big-ip Application Acceleration Manager | >=11.5.0<11.5.9 | |
F5 Big-ip Application Acceleration Manager | >=11.6.0<11.6.4 | |
F5 Big-ip Application Acceleration Manager | >=12.0.0<12.1.0 | |
F5 Big-ip Edge Gateway | >=11.5.0<11.5.9 | |
F5 Big-ip Edge Gateway | >=11.6.0<11.6.4 | |
F5 Big-ip Edge Gateway | >=12.0.0<12.1.0 | |
F5 Big-ip Fraud Protection Service | >=11.5.0<11.5.9 | |
F5 Big-ip Fraud Protection Service | >=11.6.0<11.6.4 | |
F5 Big-ip Fraud Protection Service | >=12.0.0<12.1.0 | |
F5 Big-ip Global Traffic Manager | >=11.5.0<11.5.9 | |
F5 Big-ip Global Traffic Manager | >=11.6.0<11.6.4 | |
F5 Big-ip Global Traffic Manager | >=12.0.0<12.1.0 | |
F5 Big-ip Link Controller | >=11.5.0<11.5.9 | |
F5 Big-ip Link Controller | >=11.6.0<11.6.4 | |
F5 Big-ip Link Controller | >=12.0.0<12.1.0 | |
F5 Big-ip Local Traffic Manager | >=11.5.0<11.5.9 | |
F5 Big-ip Local Traffic Manager | >=11.6.0<11.6.4 | |
F5 Big-ip Local Traffic Manager | >=12.0.0<12.1.0 | |
F5 Big-ip Policy Enforcement Manager | >=11.5.0<11.5.9 | |
F5 Big-ip Policy Enforcement Manager | >=11.6.0<11.6.4 | |
F5 Big-ip Policy Enforcement Manager | >=12.0.0<12.1.0 | |
F5 Big-ip Protocol Security Manager | >=11.5.0<11.5.9 | |
F5 Big-ip Protocol Security Manager | >=11.6.0<11.6.4 | |
F5 Big-ip Protocol Security Manager | >=12.0.0<12.1.0 | |
F5 Big-ip Webaccelerator | >=11.5.0<11.5.9 | |
F5 Big-ip Webaccelerator | >=11.6.0<11.6.4 | |
F5 Big-ip Webaccelerator | >=12.0.0<12.1.0 | |
F5 BIG-IP Analytics | >=11.5.0<11.5.9 | |
F5 BIG-IP Analytics | >=11.6.0<11.6.4 | |
F5 BIG-IP Analytics | >=12.0.0<12.1.0 | |
F5 BIG-IP Application Security Manager | >=11.5.0<11.5.9 | |
F5 BIG-IP Application Security Manager | >=11.6.0<11.6.4 | |
F5 BIG-IP Application Security Manager | >=12.0.0<12.1.0 | |
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 | ||
>=11.5.0<11.5.9 | ||
>=11.6.0<11.6.4 | ||
>=12.0.0<12.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-6605.
CVE-2019-6605 has a severity rating of high (7.5).
The vulnerability affects various versions of F5 BIG-IP Access Policy Manager, Advanced Firewall Manager, Application Acceleration Manager, Edge Gateway, Fraud Protection Service, Global Traffic Manager, Link Controller, Local Traffic Manager, Policy Enforcement Manager, Protocol Security Manager, Webaccelerator, Analytics, and Application Security Manager.
The vulnerability can cause a denial of service (DoS) on BIG-IP devices.
More information about CVE-2019-6605 can be found at the following references: [1](http://www.securityfocus.com/bid/107629), [2](https://support.f5.com/csp/article/K45353544).