CVE-2024-24989 – NGINX HTTP/3 QUIC vulnerability
https://notcve.org/view.php?id=CVE-2024-24989
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando NGINX Plus o NGINX OSS están configurados para usar el módulo HTTP/3 QUIC, las solicitudes no divulgadas pueden hacer que los procesos de trabajo de NGINX finalicen. Nota: El módulo HTTP/3 QUIC no está habilitado de forma predeterminada y se considera experimental. Para obtener más información, consulte Compatibilidad con QUIC y HTTP/3 https://nginx.org/en/docs/quic.html. NOTA: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan • http://www.openwall.com/lists/oss-security/2024/05/30/4 https://my.f5.com/manage/s/article/K000138444 • CWE-476: NULL Pointer Dereference •
CVE-2024-21763 – BIG-IP AFM vulnerability
https://notcve.org/view.php?id=CVE-2024-21763
When BIG-IP AFM Device DoS or DoS profile is configured with NXDOMAIN attack vector and bad actor detection, undisclosed queries can cause the Traffic Management Microkernel (TMM) to terminate. NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando el perfil DoS o DoS del dispositivo BIG-IP AFM se configura con el vector de ataque NXDOMAIN y la detección de malos actores, las consultas no reveladas pueden provocar la finalización del Microkernel de gestión de tráfico (TMM). NOTA: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan • https://my.f5.com/manage/s/article/K000137521 • CWE-476: NULL Pointer Dereference •
CVE-2024-23805 – F5 Application Visibility and Reporting module and BIG-IP Advanced WAF/ASM vulnerability
https://notcve.org/view.php?id=CVE-2024-23805
Undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. For the Application Visibility and Reporting module, this may occur when the HTTP Analytics profile with URLs enabled under Collected Entities is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. For BIG-IP Advanced WAF and ASM, this may occur when either a DoS or Bot Defense profile is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Note: The DB variables avr.IncludeServerInURI and avr.CollectOnlyHostnameFromURI are not enabled by default. For more information about the HTTP Analytics profile and the Collect URLs setting, refer to K30875743: Create a new Analytics profile and attach it to your virtual servers https://my.f5.com/manage/s/article/K30875743 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Las solicitudes no divulgadas pueden provocar la finalización del Microkernel de gestión de tráfico (TMM). Para el módulo de informes y visibilidad de aplicaciones, esto puede ocurrir cuando el perfil de análisis HTTP con URL habilitadas en Entidades recopiladas está configurado en un servidor virtual y las variables de base de datos avr.IncludeServerInURI o avr.CollectOnlyHostnameFromURI están habilitadas. • https://my.f5.com/manage/s/article/K000137334 • CWE-131: Incorrect Calculation of Buffer Size •
CVE-2024-21789 – BIG-IP ASM and Advanced WAF vulnerability
https://notcve.org/view.php?id=CVE-2024-21789
When a BIG-IP ASM/Advanced WAF security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando se configura una política de seguridad BIG-IP ASM/WAF avanzada en un servidor virtual, las solicitudes no divulgadas pueden provocar un aumento en la utilización de recursos de memoria. Nota: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan • https://my.f5.com/manage/s/article/K000137270 • CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2024-23308 – BIG-IP Advanced WAF and ASM vulnerability
https://notcve.org/view.php?id=CVE-2024-23308
When a BIG-IP Advanced WAF or BIG-IP ASM policy with a Request Body Handling option is attached to a virtual server, undisclosed requests can cause the BD process to terminate. The condition results from setting the Request Body Handling option in the Header-Based Content Profile for an Allowed URL with "Apply value and content signatures and detect threat campaigns." Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando una política BIG-IP Advanced WAF o BIG-IP ASM con una opción de Manejo del cuerpo de la solicitud se adjunta a un servidor virtual, las solicitudes no divulgadas pueden hacer que el proceso BD finalice. La condición resulta de configurar la opción Manejo del cuerpo de la solicitud en el perfil de contenido basado en encabezado para una URL permitida con "Aplicar firmas de valor y contenido y detectar campañas de amenazas". Nota: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan • https://my.f5.com/manage/s/article/K000137416 • CWE-476: NULL Pointer Dereference •