Executive Summary

Informations
NameCVE-2018-15322First vendor Publication2018-10-31
VendorCveLast vendor Modification2018-12-11

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P)
Cvss Base Score4Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 6.0.0-6.0.1, 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.0.1-2.3.0, or Enterprise Manager 3.1.1 a BIG-IP user granted with tmsh access may cause the BIG-IP system to experience denial-of-service (DoS) when the BIG-IP user uses the tmsh utility to run the edit cli preference command and proceeds to save the changes to another filename repeatedly. This action utilises storage space on the /var partition and when performed repeatedly causes the /var partition to be full.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15322

CWE : Common Weakness Enumeration

%idName
100 %CWE-284Access Control (Authorization) Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application36
Application23
Application23
Application23
Application23
Application23
Application23
Application23
Application23
Application23
Application23
Application4
Application23
Application1
Application1
Application1

Nessus® Vulnerability Scanner

DateDescription
2018-11-02Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL28003839.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
CONFIRM https://support.f5.com/csp/article/K28003839

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-01-09 12:07:26
  • Multiple Updates
2018-12-11 21:19:42
  • Multiple Updates
2018-10-31 17:19:49
  • First insertion