CVE-2015-7393
https://notcve.org/view.php?id=CVE-2015-7393
dcoep in BIG-IP LTM, Analytics, APM, ASM, and Link Controller 11.2.0 through 11.6.0 and 12.0.0 before 12.0.0 HF1, BIG-IP AAM 11.4.0 through 11.6.0 and 12.0.0 before 12.0.0 HF1, BIG-IP AFM and PEM 11.3.0 through 11.6.0 and 12.0.0 before 12.0.0 HF1, BIG-IP DNS 12.0.0 before 12.0.0 HF1, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.2.0 through 11.3.0, BIG-IP GTM 11.2.0 through 11.6.0, BIG-IP PSM 11.2.0 through 11.4.1, Enterprise Manager 3.0.0 through 3.1.1, BIG-IQ Cloud 4.0.0 through 4.5.0, BIG-IQ Device 4.2.0 through 4.5.0, BIG-IQ Security 4.0.0 through 4.5.0, BIG-IQ ADC 4.5.0, BIG-IQ Centralized Management 4.6.0, and BIG-IQ Cloud and Orchestration 1.0.0 allows local users with advanced shell (bash) access to gain privileges via unspecified vectors. dcoep en BIG-IP LTM, Analytics, APM, ASM y Link Controller 11.2.0 hasta la versión 11.6.0 y 12.0.0 en versiones anteriores a 12.0.0 HF1, BIG-IP AAM 11.4.0 hasta la versión 11.6.0 y 12.0.0 en versiones anteriores a 12.0.0 HF1, BIG-IP AFM y PEM 11.3.0 hasta la versión 11.6.0 y 12.0.0 en versiones anteriores a 12.0.0 HF1, BIG-IP DNS 12.0.0 en versiones anteriores a 12.0.0 HF1, BIG-IP Edge Gateway, WebAccelerator y WOM 11.2.0 hasta la versión 11.3.0, BIG-IP GTM 11.2.0 hasta la versión 11.6.0, BIG-IP PSM 11.2.0 hasta la versión 11.4.1, Enterprise Manager 3.0.0 hasta la versión 3.1.1, BIG-IQ Cloud 4.0.0 hasta la versión 4.5.0, BIG-IQ Device 4.2.0 hasta la versión 4.5.0, BIG-IQ Security 4.0.0 hasta la versión 4.5.0, BIG-IQ ADC 4.5.0, BIG-IQ Centralized Management 4.6.0 y BIG-IQ Cloud y Orchestration 1.0.0 permite a usuarios locales con acceso shell (bash) avanzado obtener privilegios a través de vectores no especificados. • http://securitytracker.com/id/1034632 http://www.securitytracker.com/id/1034633 https://support.f5.com/kb/en-us/solutions/public/k/75/sol75136237.html •
CVE-2015-6546
https://notcve.org/view.php?id=CVE-2015-6546
The vCMP host in F5 BIG-IP Analytics, APM, ASM, GTM, Link Controller, and LTM 11.0.0 before 11.6.0, BIG-IP AAM 11.4.0 before 11.6.0, BIG-IP AFM and PEM 11.3.0 before 11.6.0, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.0.0 through 11.3.0, BIG-IP PSM 11.0.0 through 11.4.1 allows remote attackers to cause a denial of service via "malicious traffic." El host vCMP en F5 BIG-IP Analytics, APM, ASM, GTM, Link Controller y LTM 11.0.0 en versiones anteriores a 11.6.0, BIG-IP AAM 11.4.0 en versiones anteriores a 11.6.0, BIG-IP AFM y PEM 11.3.0 en versiones anteriores a 11.6.0, BIG-IP Edge Gateway, WebAccelerator y WOM 11.0.0 hasta la versión 11.3.0, BIG-IP PSM 11.0.0 hasta la versión 11.4.1 permite a atacantes remotos provocar una denegación de servicio a través de 'tráfico malicioso'. • http://www.securitytracker.com/id/1033952 https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17386.html • CWE-20: Improper Input Validation •
CVE-2015-4040 – F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - Directory Traversal
https://notcve.org/view.php?id=CVE-2015-4040
Directory traversal vulnerability in the configuration utility in F5 BIG-IP before 12.0.0 and Enterprise Manager 3.0.0 through 3.1.1 allows remote authenticated users to access arbitrary files in the web root via unspecified vectors. Vulnerabilidad de salto de directorio en la utilidad de configuración en F5 BIG-IP en versiones anteriores a 12.0.0 y Enterprise Manager 3.0.0 hasta la versión 3.1.1, permite a usuarios remotos autenticados acceder a archivos arbitrarios en la raíz web a través de vectores no especificados. F5 BigIP version 10.2.4 Build 595.0 Hotfix HF3 suffers from a path traversal vulnerability. • https://www.exploit-db.com/exploits/38448 http://packetstormsecurity.com/files/133931/F5-BigIP-10.2.4-Build-595.0-HF3-Path-Traversal.html http://www.securitytracker.com/id/1033532 http://www.securitytracker.com/id/1033533 https://support.f5.com/kb/en-us/solutions/public/17000/200/sol17253.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2015-4047
https://notcve.org/view.php?id=CVE-2015-4047
racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests. racoon/gssapi.c en IPsec-Tools 0.8.2 permite a atacantes remotos causar una denegación de servicios (referencia a puntero nulo y caída de demonio IKE) a través de una serie de solicitudes UDP manipuladas. • http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/May/81 http://seclists.org/fulldisclosure/2015/May/83 http://www.debian.org/security/2015/dsa-3272 http://www.openwall.com/lists/oss-security/2015/05/20/1 http://www.openwall.com/lists/oss-security/20 • CWE-476: NULL Pointer Dereference •
CVE-2014-8730
https://notcve.org/view.php?id=CVE-2014-8730
The SSL profiles component in F5 BIG-IP LTM, APM, and ASM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, AAM 11.4.0 through 11.5.1, AFM 11.3.0 through 11.5.1, Analytics 11.0.0 through 11.5.1, Edge Gateway, WebAccelerator, and WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, PEM 11.3.0 through 11.6.0, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.4.1 and BIG-IQ Cloud and Security 4.0.0 through 4.4.0 and Device 4.2.0 through 4.4.0, when using TLS 1.x before TLS 1.2, does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). NOTE: the scope of this identifier is limited to the F5 implementation only. Other vulnerable implementations should receive their own CVE ID, since this is not a vulnerability within the design of TLS 1.x itself. El componente SSL profiles en F5 BIG-IP LTM, APM, y ASM 10.0.0 hasta 10.2.4 y 11.0.0 hasta 11.5.1, AAM 11.4.0 hasta 11.5.1, AFM 11.3.0 hasta 11.5.1, Analytics 11.0.0 hasta 11.5.1, Edge Gateway, WebAccelerator, y WOM 10.1.0 hasta 10.2.4 y 11.0.0 hasta 11.3.0, PEM 11.3.0 hasta 11.6.0, y PSM 10.0.0 hasta 10.2.4 y 11.0.0 hasta 11.4.1 y BIG-IQ Cloud and Security 4.0.0 hasta 4.4.0 y Device 4.2.0 hasta 4.4.0, cuando utiliza TLS 1.x anterior a TLS 1.2, no comprueba correctamente los bytes de relleno CBC cuando termina conexiones, lo que facilita a atacantes man-in-the-middle obtener datos en texto plano a través de un ataque del oracle de relleno, una variante de CVE-2014-3566 (también conocido como POODLE). NOTA: el alcance de este identificador está limitado a la implementación F5 exclusivamente. • http://marc.info/?l=bugtraq&m=144372772101168&w=2 http://secunia.com/advisories/62167 http://secunia.com/advisories/62224 http://secunia.com/advisories/62388 http://www-01.ibm.com/support/docview.wss?uid=swg21693271 http://www-01.ibm.com/support/docview.wss?uid=swg21693337 http://www-01.ibm.com/support/docview.wss?uid=swg21693495 http://www.openwall.com/lists/oss-security/2014/12/09/27 https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151 https://h2 • CWE-310: Cryptographic Issues •