CVE-2013-6016

CVSS V2 High 7.8 CVSS V3 None
Description
The Traffic Management Microkernel (TMM) in F5 BIG-IP LTM, APM, ASM, Edge Gateway, GTM, Link Controller, and WOM 10.0.0 through 10.2.2 and 11.0.0; Analytics 11.0.0; PSM 9.4.0 through 9.4.8, 10.0.0 through 10.2.4, and 11.0.0 through 11.4.1; and WebAccelerator 9.4.0 through 9.4.8, 10.0.0 through 10.2.4, and 11.0.0 through 11.3.0 might change a TCP connection to the ESTABLISHED state before receiving the ACK packet, which allows remote attackers to cause a denial of service (SIGFPE or assertion failure and TMM restart) via unspecified vectors.
Overview
  • CVE ID
  • CVE-2013-6016
  • Assigner
  • cret@cert.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2013-10-26T17:55:03
  • Last Modified Date
  • 2017-08-29T01:33:54
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:9.4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_edge_gateway:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_edge_gateway:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:10.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:10.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:10.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:f5:big-ip_link_controller:11.0.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
History
Created Old Value New Value Data Type Notes
2022-05-10 08:45:18 Added to TrackCVE
2022-12-01 20:29:15 cert@cert.org cret@cert.org CVE Assigner updated
2022-12-01 20:29:15 cert@cert.org cret@cert.org CVE Assigner updated
2022-12-01 20:29:15 2013-10-26T17:55Z 2013-10-26T17:55:03 CVE Published Date updated
2022-12-01 20:29:15 2013-10-26T17:55Z 2013-10-26T17:55:03 CVE Published Date updated
2022-12-01 20:29:15 2017-08-29T01:33:54 CVE Modified Date updated
2022-12-01 20:29:15 2017-08-29T01:33:54 CVE Modified Date updated
2022-12-01 20:29:16 Modified Vulnerability Status updated
2022-12-01 20:29:16 Modified Vulnerability Status updated