SB2024102823 - Denial of service in F5 BIG-IP configuration and tmsh utilities



SB2024102823 - Denial of service in F5 BIG-IP configuration and tmsh utilities

Published: October 28, 2024

Security Bulletin ID SB2024102823
Severity
Low
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper input validation (CVE-ID: CVE-2018-1000880)

The vulnerability allows a remote attacker to cause DoS condition.

The vulnerability exists due to insufficient validation of user-supplied input in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. A remote attacker can trick the victim into opening a specially crafted RAR archive and cause the service to crash.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.