Applies To:

Show Versions Show Versions

sol13233: TMM vulnerability CVE-2013-6016
Security AdvisorySecurity Advisory

Original Publication Date: 12/12/2011
Updated Date: 07/26/2016

The vulnerability described in this article has been resolved, or does not affect any F5 products. There will be no further updates, unless new information is discovered.

Vulnerability Description

The BIG-IP system may incorrectly transition a TCP connection to an ESTABLISHED state prior to receiving the appropriate ACK packet for the connection.

As a result of this issue, you may encounter the following symptoms:

  • The BIG-IP system sends a SIGFPE signal to the Traffic Management Microkernel (TMM), which results in a stack trace and core file.
  • The BIG-IP system generates an assertion failure panic string in the /var/log/tmm file that appears similar to the following example:

    notice panic: Request for segment from middle of queue

Impact

TMM may restart and temporarily fail to process traffic.

Security Issue Status

F5 Product Development tracked this vulnerability as ID 363504 (BIG-IP), and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

ProductVersions known to be vulnerableVersions known to be not vulnerableVulnerable component or feature
BIG-IP LTM11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP AAMNone11.4.0 - 11.4.1None
BIG-IP AFMNone11.3.0 - 11.4.1
None
BIG-IP Analytics11.0.011.1.0 - 11.4.1
11.0.0 HF1 and later
TMM
BIG-IP APM11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
TMM
BIG-IP ASM11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4

11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP Edge Gateway
11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
11.1.0 - 11.3.0
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
TMM
BIG-IP GTM11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP Link Controller11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4

11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP PEMNone
11.3.0 - 11.4.1
None
BIG-IP PSM11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.4.1
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP WebAccelerator11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.3.0
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
BIG-IP WOM11.0.0
10.2.2 - 10.2.2 HF2
10.2.0 - 10.2.1
9.4.8 - 9.4.8 HF4
11.1.0 - 11.3.0
11.0.0 HF1 and later
10.2.3 - 10.2.4
10.2.2 HF3 and later
9.4.8 HF5 and later
TMM
ARXNone6.0.0 - 6.4.0
5.0.0 - 5.3.1
None
Enterprise ManagerNone3.0.0 - 3.1.1
2.0.0 - 2.3.0
None
FirePassNone7.0.0
6.0.0 - 6.1.0
None
BIG-IQ CloudNone
4.0.0 - 4.1.0
None
BIG-IQ SecurityNone
4.0.0 - 4.1.0
None

Vulnerability Recommended Actions

To eliminate this vulnerability, upgrade to a version that is listed in the Versions known to be not vulnerable column in the previous table.

Supplemental Information

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)