Vigil@nce - F5 BIG-IP: denial of service via SSL Codec Alert
August 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a malicious SSL packet to F5 BIG-IP, to stop
the TMM, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 2/4.
Creation date: 02/06/2016.
Revision date: 07/06/2016.
DESCRIPTION OF THE VULNERABILITY
The F5 BIG-IP product uses TMM (Traffic Management Microkernel) to
manage the handshake of SSL sessions.
However, when a malicious SSL packet is received, a fatal error
occurs, and it is logged in /var/log/ltm as:
tmm[32354]: 01260009:4: Connection error: hud_ssl_handler:1131:
codec alert (20)
An attacker can therefore send a malicious SSL packet to F5
BIG-IP, to stop the TMM, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/F5-BIG-IP-denial-of-service-via-SSL-Codec-Alert-19766