Vigil@nce - F5 BIG-IP: denial of service via TCP
November 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can initialize a TCP session to F5 BIG-IP, in order to
trigger a denial of service.
Impacted products: BIG-IP Appliance
Severity: 2/4
Creation date: 17/10/2013
DESCRIPTION OF THE VULNERABILITY
The establishment of a TCP session requires three packets:
– SYN
– SYN-ACK
– ACK
However, in some cases, BIG-IP transits the TCP session to the
ESTABLISHED state, before receiving the ACK packet. This error
then leads to a segmentation error, or to an assertion.
An attacker can therefore initialize a TCP session to F5 BIG-IP,
in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/F5-BIG-IP-denial-of-service-via-TCP-13616