On BIG-IP version 16.0.0-16.0.1 and 14.1.2.4-14.1.3, cooperation between malicious HTTP client code and a malicious server may cause TMM to restart and generate a core file. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Project Subscriptions

Vendors Products
Big-ip Access Policy Manager Subscribe
Big-ip Advanced Firewall Manager Subscribe
Big-ip Advanced Web Application Firewall Subscribe
Big-ip Analytics Subscribe
Big-ip Application Acceleration Manager Subscribe
Big-ip Application Security Manager Subscribe
Big-ip Ddos Hybrid Defender Subscribe
Big-ip Domain Name System Subscribe
Big-ip Fraud Protection Service Subscribe
Big-ip Global Traffic Manager Subscribe
Big-ip Link Controller Subscribe
Big-ip Local Traffic Manager Subscribe
Big-ip Policy Enforcement Manager Subscribe
Big-ip Ssl Orchestrator Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-10095 On BIG-IP version 16.0.0-16.0.1 and 14.1.2.4-14.1.3, cooperation between malicious HTTP client code and a malicious server may cause TMM to restart and generate a core file. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2024-08-03T18:58:26.196Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-22977

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-12T20:15:13.673

Modified: 2024-11-21T05:51:03.290

Link: CVE-2021-22977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses