First published: Sat Jan 13 2024(Updated: )
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | |
F5 F5OS-A | =1.5.0=1.4.0>=1.3.0<=1.3.2 | 1.7.01.5.2 |
F5 F5OS-C | =1.6.0>=1.5.0<=1.5.1 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000138219 is critical due to the potential for attackers to access out of bounds memory.
To fix F5-K000138219, update affected F5 products to the patched versions specified in the security advisory.
F5-K000138219 affects specific versions of F5 BIG-IP, F5 BIG-IQ Centralized Management, and F5OS products.
Yes, F5-K000138219 could potentially lead to data loss or corruption due to accessing out of bounds memory.
Exploiting F5-K000138219 could allow an attacker to execute arbitrary code or disrupt service on vulnerable systems.