7.4
Advisory Published
Updated

F5-K000132941

First published: Mon Mar 13 2023(Updated: )

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

Affected SoftwareAffected VersionHow to fix
F5 BIG-IP and BIG-IQ Centralized Management>=17.0.0<=17.1.0
17.1.1
F5 BIG-IP and BIG-IQ Centralized Management>=16.1.0<=16.1.3
16.1.4
F5 BIG-IP and BIG-IQ Centralized Management>=15.1.0<=15.1.9
15.1.10
F5 BIG-IP and BIG-IQ Centralized Management>=14.1.0<=14.1.5
F5 BIG-IP and BIG-IQ Centralized Management>=13.1.0<=13.1.5
F5 BIG-IP and BIG-IQ Centralized Management>=8.0.0<=8.4.0
F5 BIG-IP and BIG-IQ Centralized Management=7.1.0
F5 Traffix Systems Signaling Delivery Controller=5.2.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of F5-K000132941?

    F5-K000132941 has a severity rating of high due to the potential for type confusion vulnerabilities.

  • How do I fix F5-K000132941?

    To fix F5-K000132941, upgrade to the patched versions provided by F5 such as 17.1.1, 16.1.4, or 15.1.10 depending on your current version.

  • What software does F5-K000132941 affect?

    F5-K000132941 affects F5 BIG-IP, BIG-IQ Centralized Management, and Traffix SDC across several versions.

  • What is the nature of the vulnerability in F5-K000132941?

    The nature of the vulnerability in F5-K000132941 involves type confusion in X.400 address processing within an X.509 GeneralName.

  • Is F5-K000132941 remotely exploitable?

    Yes, F5-K000132941 may be remotely exploitable due to improper handling of X.400 address parsing.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203