A BIG-IP virtual server configured with a Client SSL profile that has the non-default Session Tickets option enabled may leak up to 31 bytes of uninitialized memory. A remote attacker may exploit this vulnerability to obtain Secure Sockets Layer (SSL) session IDs from other sessions. It is possible that other data from uninitialized memory may be returned as well.
[
{
"product": "F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, PEM, PSM",
"vendor": "F5 Networks",
"versions": [
{
"status": "affected",
"version": "11.6.1 before 11.6.1 HF1 and 12.1.x before 12.1.2"
}
]
}
]
packetstormsecurity.com/files/141017/Ticketbleed-F5-TLS-Information-Disclosure.html
www.securityfocus.com/bid/96143
www.securitytracker.com/id/1037800
blog.filippo.io/finding-ticketbleed/
filippo.io/Ticketbleed/
github.com/0x00string/oldays/blob/master/CVE-2016-9244.py
support.f5.com/csp/article/K05121675
www.exploit-db.com/exploits/41298/