CVE-2019-6637
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
On BIG-IP (ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, Application logic abuse of ASM REST endpoints can lead to instability of BIG-IP system. Exploitation of this issue causes excessive memory consumption which results in the Linux kernel triggering OOM killer on arbitrary processes. The attack requires an authenticated user with role of "Guest" or greater privilege. Note: "No Access" cannot login so technically it's a role but a user with this access role cannot perform the attack.
En BIG-IP (ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4 y 12.1.0-12.1.4, el abuso de la lógica de la aplicación de los puntos finales ASM REST puede llevar a Inestabilidad del sistema BIG-IP. La operación de este problema provoca un consumo excesivo de memoria, lo que provoca que el kernel de Linux active el asesino OOM en procesos arbitrarios. El ataque requiere un usuario identificado con el rol de "Invitado" o un privilegio mayor. Nota: "Sin acceso" no puede iniciar sesión, por lo que técnicamente es un rol, pero un usuario con este rol de acceso no puede realizar el ataque.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-22 CVE Reserved
- 2019-07-03 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/109091 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.f5.com/csp/article/K29149494 | 2020-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
F5 Search vendor "F5" | Big-ip Application Security Manager Search vendor "F5" for product "Big-ip Application Security Manager" | >= 12.1.0 < 12.1.4.1 Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 12.1.0 < 12.1.4.1" | - |
Affected
| ||||||
F5 Search vendor "F5" | Big-ip Application Security Manager Search vendor "F5" for product "Big-ip Application Security Manager" | >= 13.0.0 < 13.1.1.5 Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 13.0.0 < 13.1.1.5" | - |
Affected
| ||||||
F5 Search vendor "F5" | Big-ip Application Security Manager Search vendor "F5" for product "Big-ip Application Security Manager" | >= 14.0.0 < 14.0.0.5 Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 14.0.0 < 14.0.0.5" | - |
Affected
| ||||||
F5 Search vendor "F5" | Big-ip Application Security Manager Search vendor "F5" for product "Big-ip Application Security Manager" | >= 14.1.0 < 14.1.0.6 Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 14.1.0 < 14.1.0.6" | - |
Affected
|