On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-10118 On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2024-08-03T18:58:26.021Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-23000

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-31T18:15:15.223

Modified: 2024-11-21T05:51:07.640

Link: CVE-2021-23000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.