Vulnerability Description
In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, 12.1.0-12.1.3.6, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when processing fragmented ClientHello messages in a DTLS session TMM may corrupt memory eventually leading to a crash. Only systems offering DTLS connections via APM are impacted.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Access Policy Manager | >= 11.5.1, <= 11.5.8 |
References
- http://www.securityfocus.com/bid/107403Third Party Advisory
- https://support.f5.com/csp/article/K97241515Vendor Advisory
- http://www.securityfocus.com/bid/107403Third Party Advisory
- https://support.f5.com/csp/article/K97241515Vendor Advisory
FAQ
What is CVE-2019-6596?
CVE-2019-6596 is a vulnerability with a CVSS score of 7.5 (HIGH). In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, 12.1.0-12.1.3.6, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when processing fragmented ClientHello messages in a DTLS session TMM may corrupt memory eventually lead...
How severe is CVE-2019-6596?
CVE-2019-6596 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-6596?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager.