CVE-2021-22982Classic Buffer Overflow in F5 Big-ip Domain Name System

Severity
7.2HIGHNVD
EPSS
0.4%
top 37.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 12
Latest updateMay 24

Description

On BIG-IP DNS and GTM version 13.1.x before 13.1.0.4, and all versions of 12.1.x and 11.6.x, big3d does not securely handle and parse certain payloads resulting in a buffer overflow. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages2 packages

NVDf5/big-ip_domain_name_system13.1.013.1.0.4+1
NVDf5/big-ip_global_traffic_manager11.6.111.6.5

🔴Vulnerability Details

2
GHSA
GHSA-3g9m-2rxr-22r8: On BIG-IP DNS and GTM version 132022-05-24
CVEList
CVE-2021-22982: On BIG-IP DNS and GTM version 132021-02-12

📋Vendor Advisories

1
F5
CVE-2021-22982: On BIG-IP DNS and GTM version 132021-02-12
CVE-2021-22982 — Classic Buffer Overflow in F5 | cvebase