Published on May 4th, 2019 📆 | 3044 Views ⚑
0F5 BIG-IP up to 11.5.8/11.6.3.4/12.1.4/13.1.1.4/14.1.0.1 DNS Query TCP Connection Restart denial of service
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
3.4 | $0-$5k |
A vulnerability classified as problematic has been found in F5 BIG-IP up to 11.5.8/11.6.3.4/12.1.4/13.1.1.4/14.1.0.1 (Firewall Software). This affects an unknown function of the component DNS Query Handler. The manipulation as part of a TCP Connection leads to a denial of service vulnerability (Restart). CWE is classifying the issue as CWE-404. This is going to have an impact on availability.
The weakness was shared 05/03/2019. It is possible to read the advisory at support.f5.com. This vulnerability is uniquely identified as CVE-2019-6612 since 01/22/2019. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 05/04/2019).
Upgrading to version 14.0.0-14.1.0.1 eliminates this vulnerability.
The issues 134378, 134380, 134381 and 134382 are related to this entry.
Vendor
Name
VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4
VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.4
VulDB Vector: ?
VulDB Reliability: ?
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Denial of service / Restart (CWE-404)
Local: Yes
Remote: No
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?
Upgrade: BIG-IP 14.0.0-14.1.0.1
01/22/2019 CVE assigned
05/03/2019 Advisory disclosed
05/04/2019 VulDB entry created
05/04/2019 VulDB last updateAdvisory: support.f5.com
CVE: CVE-2019-6612 (?)
See also: ?
Created: 05/04/2019 08:31 AM
Complete: ?
Comments
Upgrade your account now!
https://vuldb.com/?id.134379
No comments yet. Please log in to comment.