On F5 BIG-IP 13.0.0, 12.0.0-12.1.2, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, when processing DIAMETER transactions with carefully crafted attribute-value pairs, TMM may crash.
No CVSS v3.1
Attack Vector Network
Attack Complexity High
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:N/AC:M/Au:N/C:N/I:N/A:P
Vendors | Products |
---|---|
F5 |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
Configuration 4 [-]
|
Configuration 5 [-]
|
Configuration 6 [-]
|
Configuration 7 [-]
|
Configuration 8 [-]
|
Configuration 9 [-]
|
Configuration 10 [-]
|
Configuration 11 [-]
|
Configuration 12 [-]
|
Configuration 13 [-]
|
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104384 | Third Party Advisory VDB Entry |
https://support.f5.com/csp/article/K54130510 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: f5
Published: 2017-08-09T00:00:00
Updated: 2018-06-06T09:57:01
Reserved: 2018-01-12T00:00:00
Link: CVE-2018-5522
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-01T14:29:00.550
Modified: 2018-08-01T18:51:42.007
Link: CVE-2018-5522
JSON object: View
Redhat Information
No data.
CWE