CVE-2019-6660
https://notcve.org/view.php?id=CVE-2019-6660
On BIG-IP 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.1, undisclosed HTTP requests may consume excessive amounts of systems resources which may lead to a denial of service. En BIG-IP versiones 14.1.0 hasta 14.1.2, 14.0.0 hasta 14.0.1 y 13.1.0 hasta 13.1.1, unas peticiones HTTP no divulgadas pueden consumir cantidades excesivas de recursos del sistema, lo que puede conllevar a una denegación de servicio. • https://support.f5.com/csp/article/K23860356 • CWE-400: Uncontrolled Resource Consumption •
CVE-2019-6659
https://notcve.org/view.php?id=CVE-2019-6659
On version 14.0.0-14.1.0.1, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages. En la versión 14.0.0 hasta 14.1.0.1, los servidores virtuales de BIG-IP con TLSv1.3 habilitado pueden experimentar una denegación de servicio debido a mensajes entrantes no divulgados. • https://support.f5.com/csp/article/K34450231 •
CVE-2018-14468 – tcpdump: Buffer over-read in mfr_print() function in print-fr.c
https://notcve.org/view.php?id=CVE-2018-14468
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print(). El analizador FRF.16 en tcpdump versiones anteriores a 4.9.3, presenta una lectura excesiva del búfer en print-fr.c:mfr_print(). An out-of-bounds read vulnerability was discovered in tcpdump while printing FRF.16 packets captured in a pcap file or coming from the network. A remote attacker may abuse this flaw by sending specially crafted packets that, when printed, would trigger the flaw and crash the application. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html http://seclists.org/fulldisclosure/2019/Dec/26 https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/ • CWE-125: Out-of-bounds Read •
CVE-2018-14880 – tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c
https://notcve.org/view.php?id=CVE-2018-14880
The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr(). El analizador OSPFv3 en tcpdump versiones anteriores a 4.9.3, presenta una lectura excesiva del búfer en la función print-ospf6.c:ospf6_print_lshdr(). An out-of-bounds read vulnerability was discovered in tcpdump while printing OSPFv3 packets captured in a pcap file or coming from the network. A remote attacker may abuse this flaw by sending specially crafted packets that, when printed, would trigger the flaw and crash the application. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html http://seclists.org/fulldisclosure/2019/Dec/26 https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6 https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/ • CWE-125: Out-of-bounds Read •
CVE-2019-6654
https://notcve.org/view.php?id=CVE-2019-6654
On versions 14.0.0-14.1.2, 13.0.0-13.1.3, 12.1.0-12.1.5, and 11.5.1-11.6.5, the BIG-IP system fails to perform Martian Address Filtering (As defined in RFC 1812 section 5.3.7) on the control plane (management interface). This may allow attackers on an adjacent system to force BIG-IP into processing packets with spoofed source addresses. En las versiones 14.0.0 hasta 14.1.2, 13.0.0 hasta 13.1.3, 12.1.0 hasta 12.1.5 y 11.5.1 hasta 11.6.5, el sistema BIG-IP no puede realizar el Martian Address Filtering (como se define en RFC 1812 sección 5.3.7) en el plano de control (interfaz de administración). Esto puede permitir a atacantes en un sistema adyacente forzar a BIG-IP a procesar paquetes con direcciones de fuentes falsificadas. • https://support.f5.com/csp/article/K45644893 • CWE-20: Improper Input Validation •