First published: Wed Apr 16 2025(Updated: )
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM) | >=20.2.0<=20.3.0 | |
F5 BIG-IP Next Central Manager | >=20.2.0<=20.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000150879 is categorized as a significant vulnerability due to potential resource exhaustion.
To fix F5-K000150879, update to a patched version of F5 BIG-IP Next or BIG-IP Next Central Manager that addresses the vulnerability.
F5-K000150879 affects F5 BIG-IP Next versions from 20.2.0 to 20.3.0 inclusive.
The impact of F5-K000150879 can be denial of service due to unbounded resource allocation.
There are no recommended workarounds for F5-K000150879; upgrading to a safe version is advised.