Bug ID 802449: Valid GTP-C traffic may cause buffer overflow

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP AFM(all modules)

Known Affected Versions:
14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 14.1.4, 14.1.4.1, 14.1.4.2, 14.1.4.3, 14.1.4.4, 14.1.4.5, 14.1.4.6, 14.1.5, 14.1.5.1, 14.1.5.2, 14.1.5.3, 14.1.5.4, 14.1.5.6, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2, 15.0.1.3, 15.0.1.4

Fixed In:
15.1.0

Opened: Jul 04, 2019

Severity: 2-Critical

Symptoms

Valid GTP-C traffic may cause buffer overflow with incrementing sequence numbers.

Impact

TMM Crash/core. Traffic disrupted while tmm restarts.

Conditions

Valid GTP traffic with incrementing sequence number will cause memory corruption/core when processed through IPS library.

Workaround

The only workaround is to disable protocol inspection or remove GTP service from all protocol-inspection profiles.

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips