Lucene search

K
cve[email protected]CVE-2015-4638
HistorySep 18, 2015 - 2:59 p.m.

CVE-2015-4638

2015-09-1814:59:00
CWE-20
web.nvd.nist.gov
21
cve-2015-4638
f5 big-ip
ltm
aam
afm
analytics
apm
asm
gtm
link controller
pem
edge gateway
webaccelerator
wom
psm
dos
fragmented packet

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.6%

The FastL4 virtual server in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.3.0 through 11.5.2 and 11.6.0 through 11.6.0 HF4, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.2.1 through 11.3.0, and BIG-IP PSM 11.2.1 through 11.4.1 allows remote attackers to cause a denial of service (Traffic Management Microkernel restart) via a fragmented packet.

Affected configurations

NVD
Node
f5big-ip_advanced_firewall_managerMatch11.3.0
OR
f5big-ip_advanced_firewall_managerMatch11.4.0
OR
f5big-ip_advanced_firewall_managerMatch11.4.1
OR
f5big-ip_advanced_firewall_managerMatch11.5.0
OR
f5big-ip_advanced_firewall_managerMatch11.5.1
OR
f5big-ip_advanced_firewall_managerMatch11.5.2
OR
f5big-ip_advanced_firewall_managerMatch11.6.0
OR
f5big-ip_analyticsMatch11.3.0
OR
f5big-ip_analyticsMatch11.4.0
OR
f5big-ip_analyticsMatch11.4.1
OR
f5big-ip_analyticsMatch11.5.0
OR
f5big-ip_analyticsMatch11.5.1
OR
f5big-ip_analyticsMatch11.5.2
OR
f5big-ip_analyticsMatch11.6.0
OR
f5big-ip_application_security_managerMatch11.3.0
OR
f5big-ip_application_security_managerMatch11.4.0
OR
f5big-ip_application_security_managerMatch11.4.1
OR
f5big-ip_application_security_managerMatch11.5.0
OR
f5big-ip_application_security_managerMatch11.5.1
OR
f5big-ip_application_security_managerMatch11.5.2
OR
f5big-ip_application_security_managerMatch11.6.0
OR
f5big-ip_edge_gatewayMatch11.2.1
OR
f5big-ip_edge_gatewayMatch11.3.0
OR
f5big-ip_global_traffic_managerMatch11.3.0
OR
f5big-ip_global_traffic_managerMatch11.4.0
OR
f5big-ip_global_traffic_managerMatch11.4.1
OR
f5big-ip_global_traffic_managerMatch11.5.0
OR
f5big-ip_global_traffic_managerMatch11.5.1
OR
f5big-ip_global_traffic_managerMatch11.5.2
OR
f5big-ip_global_traffic_managerMatch11.6.0
OR
f5big-ip_link_controllerMatch11.3.0
OR
f5big-ip_link_controllerMatch11.4.0
OR
f5big-ip_link_controllerMatch11.4.1
OR
f5big-ip_link_controllerMatch11.5.0
OR
f5big-ip_link_controllerMatch11.5.1
OR
f5big-ip_link_controllerMatch11.5.2
OR
f5big-ip_link_controllerMatch11.6.0
OR
f5big-ip_local_traffic_managerMatch11.3.0
OR
f5big-ip_local_traffic_managerMatch11.4.0
OR
f5big-ip_local_traffic_managerMatch11.4.1
OR
f5big-ip_local_traffic_managerMatch11.5.0
OR
f5big-ip_local_traffic_managerMatch11.5.1
OR
f5big-ip_local_traffic_managerMatch11.5.2
OR
f5big-ip_local_traffic_managerMatch11.6.0
OR
f5big-ip_policy_enforcement_managerMatch11.3.0
OR
f5big-ip_policy_enforcement_managerMatch11.4.0
OR
f5big-ip_policy_enforcement_managerMatch11.4.1
OR
f5big-ip_policy_enforcement_managerMatch11.5.0
OR
f5big-ip_policy_enforcement_managerMatch11.5.1
OR
f5big-ip_policy_enforcement_managerMatch11.5.2
OR
f5big-ip_policy_enforcement_managerMatch11.6.0
OR
f5big-ip_protocol_security_moduleMatch11.2.1
OR
f5big-ip_protocol_security_moduleMatch11.3.0
OR
f5big-ip_protocol_security_moduleMatch11.4.0
OR
f5big-ip_protocol_security_moduleMatch11.4.1
OR
f5big-ip_webacceleratorMatch11.2.1
OR
f5big-ip_webacceleratorMatch11.3.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.6%

Related for CVE-2015-4638