CVE-2018-5527Missing Release of Resource after Effective Lifetime in F5 Big-ip Domain Name System

Severity
7.5HIGHNVD
EPSS
1.0%
top 23.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 27
Latest updateMay 13

Description

On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages13 packages

NVDf5/big-ip_domain_name_system13.0.013.1.0.7
NVDf5/big-ip_local_traffic_manager13.0.013.1.0.7
NVDf5/big-ip_global_traffic_manager13.0.013.1.0.7
NVDf5/big-ip_policy_enforcement_manager13.0.013.1.0.7
NVDf5/big-ip_websafe13.0.013.1.0.7

🔴Vulnerability Details

2
GHSA
GHSA-xg9f-gj9x-f37p: On BIG-IP 132022-05-13
CVEList
CVE-2018-5527: On BIG-IP 132018-06-27

📋Vendor Advisories

1
F5
CVE-2018-5527: On BIG-IP 132018-06-27
CVE-2018-5527 — F5 vulnerability | cvebase