First published: Fri Jan 03 2025(Updated: )
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | >=17.1.0<=17.1.2 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000149130 is considered high due to its potential to allow unauthorized memory access.
To fix F5-K000149130, upgrade to the latest patched version of F5 BIG-IP that addresses this vulnerability.
F5-K000149130 affects F5 BIG-IP versions 15.1.0 to 15.1.10, 16.1.0 to 16.1.5, and 17.1.0 to 17.1.2.
If F5-K000149130 is not addressed, attackers could exploit this vulnerability to read sensitive memory content.
No specific workaround is recommended for F5-K000149130; the primary mitigation is to apply the appropriate updates.