F5 Networks BIG-IP : Linux kernel vulnerability (K51931024) (Stack Clash)

Medium Nessus Plugin ID 105469


The remote device is missing a vendor-supplied security patch.


An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be 'jumped' over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010). (CVE-2017-1000364)


Upgrade to one of the non-vulnerable versions listed in the F5 Solution K51931024.

See Also


Plugin Details

Severity: Medium

ID: 105469

File Name: f5_bigip_SOL51931024.nasl

Version: $Revision: 3.3 $

Type: local

Published: 2017/12/28

Modified: 2018/03/02

Dependencies: 76940

Risk Information

Risk Factor: Medium


Base Score: 6.2

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 7.4

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/07/11

Reference Information

CVE: CVE-2017-1000364

OSVDB: 159367