ID

VAR-201803-1815


CVE

CVE-2018-5503


TITLE

F5 BIG-IP Policy Enforcement Manager Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-003487

DESCRIPTION

On F5 BIG-IP versions 13.0.0 - 13.1.0.3 or 12.0.0 - 12.1.3.1, TMM may restart when processing a specifically crafted page through a virtual server with an associated PEM policy that has content insertion as an action. F5 BIG-IP Policy Enforcement Manager (PEM) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. PEM is one of the policy execution managers. There are security vulnerabilities in F5BIG-IPPEM version 13.0.0 to version 13.1.0.3 and version 12.0.0 to 12.1.3.1. A remote attacker can exploit this vulnerability to create a denial of service with a specially crafted page. A security vulnerability exists in F5 BIG-IP PEM versions 13.0.0 through 13.1.0.3 and 12.0.0 through 12.1.3.1

Trust: 2.25

sources: NVD: CVE-2018-5503 // JVNDB: JVNDB-2018-003487 // CNVD: CNVD-2018-07878 // VULHUB: VHN-135534

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-07878

AFFECTED PRODUCTS

vendor:f5model:big-ip policy enforcement managerscope:ltversion:12.1.3.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:13.1.0.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.0.0 to 12.1.3

Trust: 0.8

vendor:f5model:big-ip policy enforcement managerscope:eqversion:13.0.0 to 13.1.0

Trust: 0.8

vendor:f5model:big-ip pemscope:gteversion:13.0.0,<=13.1.0.3

Trust: 0.6

vendor:f5model:big-ip pemscope:gteversion:12.0.0,<=12.1.3.1

Trust: 0.6

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.0.0

Trust: 0.6

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.1.1

Trust: 0.6

sources: CNVD: CNVD-2018-07878 // JVNDB: JVNDB-2018-003487 // CNNVD: CNNVD-201803-791 // NVD: CVE-2018-5503

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5503
value: HIGH

Trust: 1.0

NVD: CVE-2018-5503
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-07878
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201803-791
value: MEDIUM

Trust: 0.6

VULHUB: VHN-135534
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-5503
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-07878
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-135534
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5503
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-07878 // VULHUB: VHN-135534 // JVNDB: JVNDB-2018-003487 // CNNVD: CNNVD-201803-791 // NVD: CVE-2018-5503

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-135534 // JVNDB: JVNDB-2018-003487 // NVD: CVE-2018-5503

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-791

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201803-791

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003487

PATCH

title:K54562183url:https://support.f5.com/csp/article/K54562183

Trust: 0.8

title:F5BIG-IPPEM denial of service vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/126165

Trust: 0.6

title:F5 BIG-IP PEM Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79359

Trust: 0.6

sources: CNVD: CNVD-2018-07878 // JVNDB: JVNDB-2018-003487 // CNNVD: CNNVD-201803-791

EXTERNAL IDS

db:NVDid:CVE-2018-5503

Trust: 3.1

db:SECTRACKid:1040560

Trust: 1.1

db:JVNDBid:JVNDB-2018-003487

Trust: 0.8

db:CNVDid:CNVD-2018-07878

Trust: 0.6

db:CNNVDid:CNNVD-201803-791

Trust: 0.6

db:VULHUBid:VHN-135534

Trust: 0.1

sources: CNVD: CNVD-2018-07878 // VULHUB: VHN-135534 // JVNDB: JVNDB-2018-003487 // CNNVD: CNNVD-201803-791 // NVD: CVE-2018-5503

REFERENCES

url:https://support.f5.com/csp/article/k54562183

Trust: 2.3

url:http://www.securitytracker.com/id/1040560

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5503

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5503

Trust: 0.8

sources: CNVD: CNVD-2018-07878 // VULHUB: VHN-135534 // JVNDB: JVNDB-2018-003487 // CNNVD: CNNVD-201803-791 // NVD: CVE-2018-5503

SOURCES

db:CNVDid:CNVD-2018-07878
db:VULHUBid:VHN-135534
db:JVNDBid:JVNDB-2018-003487
db:CNNVDid:CNNVD-201803-791
db:NVDid:CVE-2018-5503

LAST UPDATE DATE

2024-11-23T22:59:05.004000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-07878date:2018-04-19T00:00:00
db:VULHUBid:VHN-135534date:2018-04-20T00:00:00
db:JVNDBid:JVNDB-2018-003487date:2018-05-24T00:00:00
db:CNNVDid:CNNVD-201803-791date:2018-03-23T00:00:00
db:NVDid:CVE-2018-5503date:2024-11-21T04:08:56.120

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-07878date:2018-04-19T00:00:00
db:VULHUBid:VHN-135534date:2018-03-22T00:00:00
db:JVNDBid:JVNDB-2018-003487date:2018-05-24T00:00:00
db:CNNVDid:CNNVD-201803-791date:2018-03-23T00:00:00
db:NVDid:CVE-2018-5503date:2018-03-22T18:29:00.573