ID

VAR-201710-0928


CVE

CVE-2017-12613


TITLE

Apache Portable Runtime Buffer error vulnerability

Trust: 1.4

sources: CNNVD: CNNVD-201710-1140 // JVNDB: JVNDB-2017-009633

DESCRIPTION

When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input. Apache Portable Runtime Contains a buffer error vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Apache Portable Runtime Utility is prone to multiple information-disclosure vulnerabilities. An attacker can exploit these issues to obtain sensitive information that may aid in further attacks. Failed exploit attempts will result in denial-of-service conditions. Apache Portable Runtime Utility (APR-util) 1.6.2 and prior versions are vulnerable. 7.2) - x86_64 3. Security Fix(es): * apr: Out-of-bounds array deref in apr_time_exp*() functions (CVE-2017-12613) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1493220 - CVE-2017-12615 tomcat: Remote Code Execution via JSP Upload 1493222 - CVE-2017-12616 tomcat: Information Disclosure when using VirtualDirContext 1494283 - CVE-2017-12617 tomcat: Remote Code Execution bypass for CVE-2017-12615 1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions 1540824 - CVE-2017-15698 tomcat-native: Mishandling of client certificates can allow for OCSP check bypass 1548282 - CVE-2018-1305 tomcat: Late application of security constraints can lead to resource exposure for unauthorised users 1548289 - CVE-2018-1304 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources 5. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). Summary: An update is now available for JBoss Core Services on RHEL 7. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References. (CVE-2017-12613) * It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167) * A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169) * A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679) * A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798) Red Hat would like to thank Hanno BAPck for reporting CVE-2017-9798. Bugs fixed (https://bugzilla.redhat.com/): 1463194 - CVE-2017-3167 httpd: ap_get_basic_auth_pw() authentication bypass 1463197 - CVE-2017-3169 httpd: mod_ssl NULL pointer dereference 1463207 - CVE-2017-7679 httpd: mod_mime buffer overread 1490344 - CVE-2017-9798 httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) 1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions 6. JIRA issues fixed (https://issues.jboss.org/): JBCS-402 - Errata for httpd 2.4.23.SP3 RHEL7 7. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Tue, 28 Nov 2017 22:43:47 +0000 (UTC) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: apr security update Advisory ID: RHSA-2017:3270-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:3270 Issue date: 2017-11-28 CVE Names: CVE-2017-12613 ===================================================================== 1. Summary: An update for apr is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le 3. Description: The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. Security Fix(es): * An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 Applications using the APR libraries, such as httpd, must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: apr-1.3.9-5.el6_9.1.src.rpm i386: apr-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm x86_64: apr-1.3.9-5.el6_9.1.i686.rpm apr-1.3.9-5.el6_9.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm x86_64: apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.x86_64.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: apr-1.3.9-5.el6_9.1.src.rpm x86_64: apr-1.3.9-5.el6_9.1.i686.rpm apr-1.3.9-5.el6_9.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.x86_64.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: apr-1.3.9-5.el6_9.1.src.rpm i386: apr-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm ppc64: apr-1.3.9-5.el6_9.1.ppc.rpm apr-1.3.9-5.el6_9.1.ppc64.rpm apr-debuginfo-1.3.9-5.el6_9.1.ppc.rpm apr-debuginfo-1.3.9-5.el6_9.1.ppc64.rpm apr-devel-1.3.9-5.el6_9.1.ppc.rpm apr-devel-1.3.9-5.el6_9.1.ppc64.rpm s390x: apr-1.3.9-5.el6_9.1.s390.rpm apr-1.3.9-5.el6_9.1.s390x.rpm apr-debuginfo-1.3.9-5.el6_9.1.s390.rpm apr-debuginfo-1.3.9-5.el6_9.1.s390x.rpm apr-devel-1.3.9-5.el6_9.1.s390.rpm apr-devel-1.3.9-5.el6_9.1.s390x.rpm x86_64: apr-1.3.9-5.el6_9.1.i686.rpm apr-1.3.9-5.el6_9.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.x86_64.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: apr-1.3.9-5.el6_9.1.src.rpm i386: apr-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm x86_64: apr-1.3.9-5.el6_9.1.i686.rpm apr-1.3.9-5.el6_9.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_9.1.i686.rpm apr-debuginfo-1.3.9-5.el6_9.1.x86_64.rpm apr-devel-1.3.9-5.el6_9.1.i686.rpm apr-devel-1.3.9-5.el6_9.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: apr-1.4.8-3.el7_4.1.src.rpm x86_64: apr-1.4.8-3.el7_4.1.i686.rpm apr-1.4.8-3.el7_4.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_4.1.i686.rpm apr-debuginfo-1.4.8-3.el7_4.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: apr-debuginfo-1.4.8-3.el7_4.1.i686.rpm apr-debuginfo-1.4.8-3.el7_4.1.x86_64.rpm apr-devel-1.4.8-3.el7_4.1.i686.rpm apr-devel-1.4.8-3.el7_4.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: apr-1.4.8-3.el7_4.1.src.rpm x86_64: apr-1.4.8-3.el7_4.1.i686.rpm apr-1.4.8-3.el7_4.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_4.1.i686.rpm apr-debuginfo-1.4.8-3.el7_4.1.x86_64.rpm apr-devel-1.4.8-3.el7_4.1.i686.rpm apr-devel-1.4.8-3.el7_4.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: apr-1.4.8-3.el7_4.1.src.rpm ppc64: apr-1.4.8-3.el7_4.1.ppc.rpm apr-1.4.8-3.el7_4.1.ppc64.rpm apr-debuginfo-1.4.8-3.el7_4.1.ppc.rpm apr-debuginfo-1.4.8-3.el7_4.1.ppc64.rpm apr-devel-1.4.8-3.el7_4.1.ppc.rpm apr-devel-1.4.8-3.el7_4.1.ppc64.rpm ppc64le: apr-1.4.8-3.el7_4.1.ppc64le.rpm apr-debuginfo-1.4.8-3.el7_4.1.ppc64le.rpm apr-devel-1.4.8-3.el7_4.1.ppc64le.rpm s390x: apr-1.4.8-3.el7_4.1.s390.rpm apr-1.4.8-3.el7_4.1.s390x.rpm apr-debuginfo-1.4.8-3.el7_4.1.s390.rpm apr-debuginfo-1.4.8-3.el7_4.1.s390x.rpm apr-devel-1.4.8-3.el7_4.1.s390.rpm apr-devel-1.4.8-3.el7_4.1.s390x.rpm x86_64: apr-1.4.8-3.el7_4.1.i686.rpm apr-1.4.8-3.el7_4.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_4.1.i686.rpm apr-debuginfo-1.4.8-3.el7_4.1.x86_64.rpm apr-devel-1.4.8-3.el7_4.1.i686.rpm apr-devel-1.4.8-3.el7_4.1.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: apr-1.4.8-3.el7_4.1.src.rpm aarch64: apr-1.4.8-3.el7_4.1.aarch64.rpm apr-debuginfo-1.4.8-3.el7_4.1.aarch64.rpm apr-devel-1.4.8-3.el7_4.1.aarch64.rpm ppc64le: apr-1.4.8-3.el7_4.1.ppc64le.rpm apr-debuginfo-1.4.8-3.el7_4.1.ppc64le.rpm apr-devel-1.4.8-3.el7_4.1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: apr-1.4.8-3.el7_4.1.src.rpm x86_64: apr-1.4.8-3.el7_4.1.i686.rpm apr-1.4.8-3.el7_4.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_4.1.i686.rpm apr-debuginfo-1.4.8-3.el7_4.1.x86_64.rpm apr-devel-1.4.8-3.el7_4.1.i686.rpm apr-devel-1.4.8-3.el7_4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-12613 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFaHeYxXlSAg2UNWIIRAq68AJ40znkuoeryDgG2kL1l2MTpL+oD6wCggb4M AW0e3FjuWmFdkBHik4lmxdc= =vZ+z -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.61

sources: NVD: CVE-2017-12613 // JVNDB: JVNDB-2017-009633 // BID: 101560 // VULMON: CVE-2017-12613 // PACKETSTORM: 147393 // PACKETSTORM: 145457 // PACKETSTORM: 146687 // PACKETSTORM: 145455 // PACKETSTORM: 145456 // PACKETSTORM: 145141 // PACKETSTORM: 146384

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.7

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:apachemodel:portable runtimescope:ltversion:1.7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:software collectionsscope:eqversion:1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:jboss core servicesscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:jboss core servicesscope:eqversion:1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:3.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:apachemodel:portable runtimescope:lteversion:apr 1.6.2

Trust: 0.8

vendor:apachemodel:portable runtimescope:eqversion:1.6.2

Trust: 0.6

vendor:f5model:iworkflowscope:eqversion:2.3

Trust: 0.3

vendor:f5model:iworkflowscope:eqversion:2.2

Trust: 0.3

vendor:f5model:iworkflowscope:eqversion:2.0.1

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.1.1

Trust: 0.3

vendor:f5model:big-iq cloud and orchestrationscope:eqversion:1.0

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:6.0.1

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:6.0

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.4

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.3

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.2

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.1

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:5.0

Trust: 0.3

vendor:f5model:big-iq centralized managementscope:eqversion:4.6

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip websafe hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip websafe hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip websafe hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip websafe hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip websafe hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip websafe hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip websafe hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip websafe hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip websafe hf1scope:eqversion:13.0.0

Trust: 0.3

vendor:f5model:big-ip websafe hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip websafescope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip pem hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip pem hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip pem hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip pem hfscope:eqversion:12.1.21

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip pem hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip pem hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip pem hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip pem hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip pem hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip pem hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip pem hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:13.0.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip pem hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip pem hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip ltm hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltm hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltm hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip link controller hf8scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controller hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controller hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:13.0.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:13.0.0

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip gtm hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip dns hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip dns hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip dns hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip dns hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip dns hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip dns hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip asm hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asm hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asm hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip apm hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apm hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip apm hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip analytics hf8scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip analytics hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip afm hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip afm hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip afm hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip afm hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip afm hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip afm hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip afm hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip afm hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip afm hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip afm hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip afm hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip afm hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:14.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:13.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:13.0.1

Trust: 0.3

vendor:f5model:big-ip aam hf3scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip aam hf2scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:13.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.3

Trust: 0.3

vendor:f5model:big-ip aam hf2scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.1

Trust: 0.3

vendor:f5model:big-ip aam hf2scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:12.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.3

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.2

Trust: 0.3

vendor:f5model:big-ip aam hf2scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.7

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.6

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.5

Trust: 0.3

vendor:f5model:big-ip aam hf3scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip aam hf2scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip aam hf2scope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.3

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip aam hf6scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aam hf11scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aam hf10scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:12.1.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.4

Trust: 0.3

vendor:f5model:big-ip aam hf1scope:eqversion:11.5.3

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.6.2

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.6.1

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.6

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.10

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.9

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.8

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.7

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.6

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.5

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.4

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.3

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.2

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.13

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.12

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.10

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.9

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.7

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.18

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.17

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.16

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.15

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.14

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.13

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.12

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.11

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.10

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.9

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.8

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.7

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.6

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.4

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.4.4

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.4.3

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.1

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.3.0

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.6

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.2

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.2.1

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.1.2

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.1.1

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.1.0

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:1.0.1

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.3

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.2

Trust: 0.3

vendor:apachemodel:apr-utilscope:eqversion:0.9.1

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip websafescope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:12.1.3.6

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:14.1

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:14.0.0.3

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:13.1.0.6

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:12.1.3.6

Trust: 0.3

vendor:apachemodel:apr-utilscope:neversion:1.6.3

Trust: 0.3

sources: BID: 101560 // CNNVD: CNNVD-201710-1140 // JVNDB: JVNDB-2017-009633 // NVD: CVE-2017-12613

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12613
value: HIGH

Trust: 1.0

NVD: CVE-2017-12613
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201710-1140
value: HIGH

Trust: 0.6

VULMON: CVE-2017-12613
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-12613
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2017-12613
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2017-12613
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2017-12613 // CNNVD: CNNVD-201710-1140 // JVNDB: JVNDB-2017-009633 // NVD: CVE-2017-12613

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:CWE-119

Trust: 0.8

sources: JVNDB: JVNDB-2017-009633 // NVD: CVE-2017-12613

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201710-1140

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201710-1140

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009633

PATCH

title:Revision 1807976url:https://svn.apache.org/viewvc?view=revision&revision=1807976

Trust: 0.8

title:[Announce] Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Releasedurl:https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E

Trust: 0.8

title:Apache Portable Runtime Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75975

Trust: 0.6

title:Red Hat: Important: apr security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173270 - Security Advisory

Trust: 0.1

title:Red Hat: Important: apr security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20181253 - Security Advisory

Trust: 0.1

title:Red Hat: Important: httpd24-apr security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20180316 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173476 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173477 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2017-928url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2017-928

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20173475 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: apr: CVE-2021-35940url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=5e2c059c594375a9d2d057d113f3ebb3

Trust: 0.1

title:Debian CVElist Bug Report Logs: apr-util: CVE-2017-12618url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=0c479ddd46c3cd7bf25cdba9c0b98fc7

Trust: 0.1

title:Debian CVElist Bug Report Logs: apr: CVE-2017-12613url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=8dd946abfc105514416d717cf93b9295

Trust: 0.1

title:Arch Linux Advisories: [ASA-201710-32] apr: information disclosureurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201710-32

Trust: 0.1

title:Red Hat: CVE-2017-12613url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2017-12613

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20180466 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20180465 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2017-12613

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security SiteProtector System is affected by Apache HTTP Server vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=ad93b14b1ee3141c8131a0ba5a4f74ac

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=586e6062440cdd312211d748e028164e

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=7251d5e5f2b1771951980ad7cfde50ba

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-35940

Trust: 0.1

title:CVE-2021-35940url:https://github.com/AlAIAL90/CVE-2021-35940

Trust: 0.1

sources: VULMON: CVE-2017-12613 // CNNVD: CNNVD-201710-1140 // JVNDB: JVNDB-2017-009633

EXTERNAL IDS

db:NVDid:CVE-2017-12613

Trust: 3.5

db:BIDid:101560

Trust: 2.0

db:SECTRACKid:1042004

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/08/23/1

Trust: 1.7

db:JVNDBid:JVNDB-2017-009633

Trust: 0.8

db:AUSCERTid:ESB-2018.0660.10

Trust: 0.6

db:AUSCERTid:ESB-2019.1429

Trust: 0.6

db:AUSCERTid:ESB-2022.0349

Trust: 0.6

db:NSFOCUSid:37867

Trust: 0.6

db:CNNVDid:CNNVD-201710-1140

Trust: 0.6

db:VULMONid:CVE-2017-12613

Trust: 0.1

db:PACKETSTORMid:147393

Trust: 0.1

db:PACKETSTORMid:145457

Trust: 0.1

db:PACKETSTORMid:146687

Trust: 0.1

db:PACKETSTORMid:145455

Trust: 0.1

db:PACKETSTORMid:145456

Trust: 0.1

db:PACKETSTORMid:145141

Trust: 0.1

db:PACKETSTORMid:146384

Trust: 0.1

sources: VULMON: CVE-2017-12613 // BID: 101560 // PACKETSTORM: 147393 // PACKETSTORM: 145457 // PACKETSTORM: 146687 // PACKETSTORM: 145455 // PACKETSTORM: 145456 // PACKETSTORM: 145141 // PACKETSTORM: 146384 // CNNVD: CNNVD-201710-1140 // JVNDB: JVNDB-2017-009633 // NVD: CVE-2017-12613

REFERENCES

url:http://www.securityfocus.com/bid/101560

Trust: 2.3

url:https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3cannounce.apache.org%3e

Trust: 2.0

url:https://access.redhat.com/errata/rhsa-2017:3270

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2017:3477

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2017:3476

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2017:3475

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:0316

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:0465

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1253

Trust: 1.8

url:https://svn.apache.org/viewvc?view=revision&revision=1807976

Trust: 1.7

url:http://www.apache.org/dist/apr/announcement1.x.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:0466

Trust: 1.7

url:http://www.securitytracker.com/id/1042004

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/08/23/1

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-12613

Trust: 1.5

url:https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3ccommits.apr.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3ccommits.apr.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3cdev.apr.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3cannounce.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3cdev.apr.apache.org%3e

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12613

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2017-12613

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.7

url:http://www.nsfocus.net/vulndb/37867

Trust: 0.6

url:https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3cannounce.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3ccommits.apr.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3ccommits.apr.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3cdev.apr.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3cdev.apr.apache.org%3e

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=swg22014121

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10880665

Trust: 0.6

url:https://www.auscert.org.au/bulletins/79734

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0349

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2018.0660.10/

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:http://www.apache.org/

Trust: 0.3

url:https://support.f5.com/csp/article/k52319810

Trust: 0.3

url:https://issues.jboss.org/):

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-9798

Trust: 0.3

url:https://access.redhat.com/documentation/en/red-hat-jboss-core-services/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-7679

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-3167

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-7679

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-3169

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-3169

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-9798

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-3167

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=56070

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12617

Trust: 0.1

url:https://access.redhat.com/solutions/2435491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12617

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-15698

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1305

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12615

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12615

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1304

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/httpoxy

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=3.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1304

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1305

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15698

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp&downloadtype=securitypatches&version=2.4.23

Trust: 0.1

sources: VULMON: CVE-2017-12613 // BID: 101560 // PACKETSTORM: 147393 // PACKETSTORM: 145457 // PACKETSTORM: 146687 // PACKETSTORM: 145455 // PACKETSTORM: 145456 // PACKETSTORM: 145141 // PACKETSTORM: 146384 // CNNVD: CNNVD-201710-1140 // JVNDB: JVNDB-2017-009633 // NVD: CVE-2017-12613

CREDITS

The vendor reported this issue.

Trust: 0.9

sources: BID: 101560 // CNNVD: CNNVD-201710-1140

SOURCES

db:VULMONid:CVE-2017-12613
db:BIDid:101560
db:PACKETSTORMid:147393
db:PACKETSTORMid:145457
db:PACKETSTORMid:146687
db:PACKETSTORMid:145455
db:PACKETSTORMid:145456
db:PACKETSTORMid:145141
db:PACKETSTORMid:146384
db:CNNVDid:CNNVD-201710-1140
db:JVNDBid:JVNDB-2017-009633
db:NVDid:CVE-2017-12613

LAST UPDATE DATE

2025-12-22T21:54:50.775000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2017-12613date:2023-11-07T00:00:00
db:BIDid:101560date:2019-02-14T08:00:00
db:CNNVDid:CNNVD-201710-1140date:2022-01-26T00:00:00
db:JVNDBid:JVNDB-2017-009633date:2017-11-16T00:00:00
db:NVDid:CVE-2017-12613date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULMONid:CVE-2017-12613date:2017-10-24T00:00:00
db:BIDid:101560date:2017-10-23T00:00:00
db:PACKETSTORMid:147393date:2018-04-27T14:51:47
db:PACKETSTORMid:145457date:2017-12-17T15:29:14
db:PACKETSTORMid:146687date:2018-03-07T18:12:55
db:PACKETSTORMid:145455date:2017-12-17T15:27:58
db:PACKETSTORMid:145456date:2017-12-17T15:28:41
db:PACKETSTORMid:145141date:2017-11-28T23:25:00
db:PACKETSTORMid:146384date:2018-02-13T19:22:00
db:CNNVDid:CNNVD-201710-1140date:2017-10-31T00:00:00
db:JVNDBid:JVNDB-2017-009633date:2017-11-16T00:00:00
db:NVDid:CVE-2017-12613date:2017-10-24T01:29:02