|Category:||F5 Local Security Checks|
|Title:||F5 BIG-IP - TMM iRules vulnerability CVE-2016-5024|
|Summary:||On a BIG-IP LTM with a virtual server configured to parse RADIUS messages via an iRule, a remote attacker may be able to cause TMM to restart using malicious network traffic.|
On a BIG-IP LTM with a virtual server configured to parse RADIUS messages via an iRule, a remote attacker may be able to cause TMM to restart using malicious network traffic.
On a BIG-IP system that is configured for high-availability, this vulnerability would result in a failover event and may temporarily disrupt services. Where no failover device is available, traffic would be disrupted until the Traffic Management Microkernel (TMM) process has restarted.
See the referenced vendor advisory for a solution.
Common Vulnerability Exposure (CVE) ID: CVE-2016-5024|
BugTraq ID: 95228
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.