Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5cjp-4h3f-m7r2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

On version 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, and all versions of 13.1.x, 12.1.x and 11.6.x, when BIG-IP APM performs Online Certificate Status Protocol (OCSP) verification of a certificate that contains Authority Information Access (AIA), undisclosed requests may cause an increase in memory use. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

On version 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, and all versions of 13.1.x, 12.1.x and 11.6.x, when BIG-IP APM performs Online Certificate Status Protocol (OCSP) verification of a certificate that contains Authority Information Access (AIA), undisclosed requests may cause an increase in memory use. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

EPSS

Процентиль: 56%
0.00338
Низкий

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 5.3
nvd
больше 4 лет назад

On version 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, and all versions of 13.1.x, 12.1.x and 11.6.x, when BIG-IP APM performs Online Certificate Status Protocol (OCSP) verification of a certificate that contains Authority Information Access (AIA), undisclosed requests may cause an increase in memory use. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.3
fstec
больше 4 лет назад

Уязвимость компонента OCSP Responder средства контроля доступа и удаленной аутентификации BIG-IP Access Policy Manager, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 56%
0.00338
Низкий

Дефекты

CWE-400