Vulnerabilities > CVE-2017-0303 - Incomplete Cleanup vulnerability in F5 products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 13.0.0, 12.0.0 to 12.1.2 and 11.5.1 to 11.6.1, under limited circumstances connections handled by a Virtual Server with an associated SOCKS profile may not be properly cleaned up, potentially leading to resource starvation. Connections may be left in the connection table which then can only be removed by restarting TMM. Over time this may lead to the BIG-IP being unable to process further connections.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL30201296.NASL |
description | In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 13.0.0, 12.0.0 to 12.1.2 and 11.5.1 to 11.6.1, under limited circumstances connections handled by a Virtual Server with an associated SOCKS profile may not be properly cleaned up, potentially leading to resource starvation. Connections may be left in the connection table which then can only be removed by restarting TMM. Over time this may lead to the BIG-IP being unable to process further connections. (CVE-2017-0303) Impact Connections may remain in the connection table that you can only removeby restarting the Traffic Management Microkernel (TMM).Over time, the BIG-IP system may be unable to process further connections. |
last seen | 2020-03-17 |
modified | 2017-10-27 |
plugin id | 104192 |
published | 2017-10-27 |
reporter | This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/104192 |
title | F5 Networks BIG-IP : SOCKS proxy vulnerability (K30201296) |