First published: Wed Aug 26 2020(Updated: )
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, and 14.1.0-14.1.2.6, a BIG-IP virtual server with a Session Initiation Protocol (SIP) ALG profile, parsing SIP messages that contain a multi-part MIME payload with certain boundary strings can cause TMM to free memory to the wrong cache.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Access Policy Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Analytics | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.0.5 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.2.7 | |
f5 big-ip application acceleration manager | >=15.0.0<15.0.1.4 | |
f5 big-ip application acceleration manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Application Security Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Application Security Manager | >=15.1.0<15.1.0.5 | |
f5 big-ip domain name system | >=14.1.0<14.1.2.7 | |
f5 big-ip domain name system | >=15.0.0<15.0.1.4 | |
f5 big-ip domain name system | >=15.1.0<15.1.0.5 | |
f5 big-ip fraud protection service | >=14.1.0<14.1.2.7 | |
f5 big-ip fraud protection service | >=15.0.0<15.0.1.4 | |
f5 big-ip fraud protection service | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Global Traffic Manager | >=15.1.0<15.1.0.5 | |
f5 big-ip link controller | >=14.1.0<14.1.2.7 | |
f5 big-ip link controller | >=15.0.0<15.0.1.4 | |
f5 big-ip link controller | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5926 is classified as a high severity vulnerability.
To remediate CVE-2020-5926, upgrade to the versions provided by F5 that are not vulnerable.
CVE-2020-5926 affects F5 BIG-IP Access Policy Manager, Advanced Firewall Manager, Analytics, Application Acceleration Manager, Application Security Manager, Domain Name System, Fraud Protection Service, Global Traffic Manager, Link Controller, Local Traffic Manager, and Policy Enforcement Manager.
CVE-2020-5926 can cause the Traffic Management Microkernel (TMM) to free memory incorrectly, potentially leading to performance degradation.
CVE-2020-5926 is associated with SIP messages that contain a multi-part MIME payload with specific boundary strings.