Vulnerabilities > CVE-2018-5508 - Unspecified vulnerability in F5 Big-Ip Policy Enforcement Manager

047910
CVSS 5.9 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
high complexity
f5
nessus

Summary

On F5 BIG-IP PEM versions 13.0.0, 12.0.0-12.1.3.1, 11.6.0-11.6.2, 11.5.1-11.5.5, or 11.2.1, under certain conditions, TMM may crash when processing compressed data though a Virtual Server with an associated PEM profile using the content insertion option.

Nessus

NASL familyF5 Networks Local Security Checks
NASL idF5_BIGIP_SOL10329515.NASL
descriptionUnder certain conditions, TMM may produce a core file and restart when processing compressed data though a virtual server with an associated PEM profile using the content insertion option. (CVE-2018-5508) Impact The Traffic Management Microkernel (TMM) generates a core file and restarts. If configured as part of a high availability (HA) device group, the BIG-IP system fails over to the peer device.
last seen2020-03-17
modified2018-11-02
plugin id118627
published2018-11-02
reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/118627
titleF5 Networks BIG-IP : BIG-IP PEM vulnerability (K10329515)