First published: Fri Oct 25 2024(Updated: )
libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000148256 is classified as a Denial of Service (DoS) risk due to improper input validation.
To fix F5-K000148256, upgrade to the latest versions of the affected software as specified in the advisory.
F5-K000148256 affects specific versions of F5 BIG-IP and F5 Traffix Systems Signaling Delivery Controller.
F5-K000148256 allows attackers to cause quasi-infinite run time and excessive disk usage through improper input handling.
The vulnerable versions of F5 BIG-IP according to F5-K000148256 range from 15.1.0 to 15.1.10, 16.1.0 to 16.1.5, and 17.1.0 to 17.1.1.