Buffer overflow in big3d agent in F5 BIG-IP DNS



Published: 2021-02-11
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-22982
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
BIG-IP DNS
Hardware solutions / Routers & switches, VoIP, GSM, etc

BIG-IP GTM
Hardware solutions / Security hardware applicances

Vendor F5 Networks

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU50617

Risk: Medium

CVSSv3.1: 4.4 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-22982

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in big3d. A remote user can send specially crafted data to the big3d agent, trigger a buffer overflow and crash the agent.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

BIG-IP DNS: 12.1.0 - 13.1.0.3

BIG-IP GTM: 11.6.1 - 11.6.5.2

External links

http://support.f5.com/csp/article/K72708443


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###