F5 Networks BIG-IP : BIG-IP FastL4 TMM vulnerability (K65615624)
Medium Nessus Plugin ID 104415
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionIn BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.
A remote attacker may be able to cause a BIG-IP system to produce a core file, disrupting the flow of traffic and causing a failover to a standby system, if configured. BIG-IP logs will show the notice panic:
packet_free: double free! error when TMM crashes.
SolutionUpgrade to one of the non-vulnerable versions listed in the F5 Solution K65615624.