Denial of service in F5 Networks BIG-IP Wireshark/tshark component



Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2019-12295
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
BIG-IP
Hardware solutions / Firmware

Vendor F5 Networks

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Resource management error

EUVDB-ID: #VU20968

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-12295

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to unspecified error when processing untrusted data in the Wireshark dissection engine in epan/packet.c. A remote attacker can trick the victim to view the malformed packet trace file and crash the application.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

BIG-IP: 15.0.0 - 15.0.1

CPE2.3 External links

https://api-u.f5.com/support/kb-articles/K06725231?cacheFlag=false


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###