Applies To:

Show Versions Show Versions

sol13233: TMM vulnerability CVE-2013-6016
Security AdvisorySecurity Advisory

Original Publication Date: 12/12/2011
Updated Date: 12/03/2013

Description

The BIG-IP system may incorrectly transition a TCP connection to an ESTABLISHED state prior to receiving the appropriate ACK packet for the connection.

As a result of this issue, you may encounter the following symptoms:

  • The BIG-IP system sends a SIGFPE signal to the Traffic Management Microkernel (TMM), which results in a stack trace and core file.
  • The BIG-IP system generates an assertion failure panic string in the /var/log/tmm file that appears similar to the following example:

    notice panic: Request for segment from middle of queue

Impact

TMM may restart and temporarily fail to process traffic.

Status

F5 Product Development tracked this vulnerability as ID 363504 (BIG-IP), and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Vulnerable component or feature
BIG-IP LTM 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP AAM None 11.4.0 - 11.4.1 None
BIG-IP AFM None 11.3.0 - 11.4.1
None
BIG-IP Analytics 11.0.0 11.1.0 - 11.4.1
11.0.0 HF1 and later
TMM
BIG-IP APM 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
TMM
BIG-IP ASM 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4

11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP Edge Gateway
11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
11.1.0 - 11.3.0
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
TMM
BIG-IP GTM 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP Link Controller 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4

11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP PEM None
11.3.0 - 11.4.1
None
BIG-IP PSM 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP WebAccelerator 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.3.0
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP WOM 11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.3.0
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
ARX None 6.0.0 - 6.4.0
5.0.0 - 5.3.1
None
Enterprise Manager None 3.0.0 - 3.1.1
2.0.0 - 2.3.0
None
FirePass None 7.0.0
6.0.0 - 6.1.0
None
BIG-IQ Cloud None
4.0.0 - 4.1.0
None
BIG-IQ Security None
4.0.0 - 4.1.0
None

Recommended action

To eliminate this vulnerability, upgrade to a version that is listed in the Versions known to be not vulnerable column in the previous table.

Supplemental Information

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)