![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.105515 |
Kategorie: | F5 Local Security Checks |
Titel: | F5 BIG-IP - BIG-IP last hop kernel module vulnerability CVE-2015-5516 |
Zusammenfassung: | The remote host is missing a security patch. |
Beschreibung: | Summary: The remote host is missing a security patch. Vulnerability Insight: The BIG-IP last hop kernel module may leak memory when processing User Datagram Protocol (UDP) traffic. The memory leak may cause denial-of-service (DoS) conditions for the BIG-IP system. Vulnerability Impact: The following configurations may allow a remote attacker to cause a memory leak and potential DoS conditions on BIG-IP systems: - You use the management interface to provide remote access to UDP based services. - You use self IP addresses to provide remote access to UDP based services. - Virtual servers that reference a DNS profile with the Use BIND Server on BIG-IP option enabled (the option is enabled by default in BIG-IP 11.2.x through 12.0.0). - Wide IPs reference either of the following pool configurations: - A pool using the Return to DNS load balancing method. - A pool in which the Alternate and Fallback load balancing methods are set to None and all pools associated with the wide IP are unavailable. Solution: See the referenced vendor advisory for a solution. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5516 http://www.securitytracker.com/id/1034686 http://www.securitytracker.com/id/1034687 |
Copyright | Copyright (C) 2016 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |