Multiple F5 BIG-IP Products CVE-2019-6671 Memory Leak Denial of Service Vulnerability

Risk

Medium

Date Discovered

November 27, 2019

Description

Multiple F5 BIG-IP Products are prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial of service condition.

Technologies Affected

  • F5 BIG-IP AAM 13.1.0
  • F5 BIG-IP AAM 13.1.3
  • F5 BIG-IP AAM 14.0.0
  • F5 BIG-IP AAM 14.0.1
  • F5 BIG-IP AAM 14.1.0
  • F5 BIG-IP AAM 14.1.2
  • F5 BIG-IP AAM 15.0.0
  • F5 BIG-IP AAM 15.0.1
  • F5 BIG-IP AFM 13.1.0
  • F5 BIG-IP AFM 13.1.3
  • F5 BIG-IP AFM 14.0.0
  • F5 BIG-IP AFM 14.0.1
  • F5 BIG-IP AFM 14.1.0
  • F5 BIG-IP AFM 14.1.2
  • F5 BIG-IP AFM 15.0.0
  • F5 BIG-IP AFM 15.0.1
  • F5 BIG-IP APM 13.1.0
  • F5 BIG-IP APM 13.1.3
  • F5 BIG-IP APM 14.0.0
  • F5 BIG-IP APM 14.0.1
  • F5 BIG-IP APM 14.1.0
  • F5 BIG-IP APM 14.1.2
  • F5 BIG-IP APM 15.0.0
  • F5 BIG-IP APM 15.0.1
  • F5 BIG-IP ASM 13.1.0
  • F5 BIG-IP ASM 13.1.3
  • F5 BIG-IP ASM 14.0.0
  • F5 BIG-IP ASM 14.0.1
  • F5 BIG-IP ASM 14.1.0
  • F5 BIG-IP ASM 14.1.2
  • F5 BIG-IP ASM 15.0.0
  • F5 BIG-IP ASM 15.0.1
  • F5 BIG-IP Analytics 13.1.0
  • F5 BIG-IP Analytics 13.1.3
  • F5 BIG-IP Analytics 14.0.0
  • F5 BIG-IP Analytics 14.0.1
  • F5 BIG-IP Analytics 14.1.0
  • F5 BIG-IP Analytics 14.1.2
  • F5 BIG-IP Analytics 15.0.0
  • F5 BIG-IP Analytics 15.0.1
  • F5 BIG-IP DNS 13.1.0
  • F5 BIG-IP DNS 13.1.3
  • F5 BIG-IP DNS 14.0.0
  • F5 BIG-IP DNS 14.0.1
  • F5 BIG-IP DNS 14.1.0
  • F5 BIG-IP DNS 14.1.2
  • F5 BIG-IP DNS 15.0.0
  • F5 BIG-IP DNS 15.0.1
  • F5 BIG-IP Edge Gateway 13.1.0
  • F5 BIG-IP Edge Gateway 13.1.3
  • F5 BIG-IP Edge Gateway 14.0.0
  • F5 BIG-IP Edge Gateway 14.1.0
  • F5 BIG-IP FPS 13.1.0
  • F5 BIG-IP FPS 13.1.3
  • F5 BIG-IP FPS 14.0.0
  • F5 BIG-IP FPS 14.0.1
  • F5 BIG-IP FPS 14.1.0
  • F5 BIG-IP FPS 14.1.2
  • F5 BIG-IP FPS 15.0.0
  • F5 BIG-IP FPS 15.0.1
  • F5 BIG-IP GTM 13.1.0
  • F5 BIG-IP GTM 13.1.3
  • F5 BIG-IP GTM 14.0.0
  • F5 BIG-IP GTM 14.0.1
  • F5 BIG-IP GTM 14.1.0
  • F5 BIG-IP GTM 14.1.2
  • F5 BIG-IP GTM 15.0.0
  • F5 BIG-IP GTM 15.0.1
  • F5 BIG-IP LTM 13.1.0
  • F5 BIG-IP LTM 13.1.3
  • F5 BIG-IP LTM 14.0.0
  • F5 BIG-IP LTM 14.0.1
  • F5 BIG-IP LTM 14.1.0
  • F5 BIG-IP LTM 14.1.2
  • F5 BIG-IP LTM 15.0.0
  • F5 BIG-IP LTM 15.0.1
  • F5 BIG-IP Link Controller 13.1.0
  • F5 BIG-IP Link Controller 13.1.3
  • F5 BIG-IP Link Controller 14.0.0
  • F5 BIG-IP Link Controller 14.0.1
  • F5 BIG-IP Link Controller 14.1.0
  • F5 BIG-IP Link Controller 14.1.2
  • F5 BIG-IP Link Controller 15.0.0
  • F5 BIG-IP Link Controller 15.0.1
  • F5 BIG-IP PEM 13.1.0
  • F5 BIG-IP PEM 13.1.3
  • F5 BIG-IP PEM 14.0.0
  • F5 BIG-IP PEM 14.0.1
  • F5 BIG-IP PEM 14.1.0
  • F5 BIG-IP PEM 14.1.2
  • F5 BIG-IP PEM 15.0.0
  • F5 BIG-IP PEM 15.0.1
  • F5 BIG-IP WebAccelerator 13.1.0
  • F5 BIG-IP WebAccelerator 13.1.3
  • F5 BIG-IP WebAccelerator 14.0.0
  • F5 BIG-IP WebAccelerator 14.0.1
  • F5 BIG-IP WebAccelerator 14.1.0
  • F5 BIG-IP WebAccelerator 14.1.2
  • F5 BIG-IP WebAccelerator 15.0.0
  • F5 BIG-IP WebAccelerator 15.0.1

Recommendations

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, run the application with the minimal amount of privileges required for functionality.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity including unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.

Updates are available. Please see the references or vendor advisory for more information.

References

Credits

The vendor reported this issue.


© 1995- Symantec Corporation

Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from secure@symantec.com.

Disclaimer

The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.

Symantec, Symantec products, Symantec Security Response, and secure@symantec.com are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.