Bug ID 520038: Added/updated signatures are added to certain corrupted Manual user-defined sets.

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
11.4.0, 11.4.1, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0, 11.5.5

Opened: Apr 26, 2015

Severity: 3-Major

Symptoms

Signature set may contain signatures which are not supposed to be part of the set.

Impact

Requests may get blocked due to attack signatures which are actually not supposed to be in the policy.

Conditions

Corrupted manual user-defined signature sets can no longer be created after the fix for Bug 441075. However, pre-existing corrupted manual sets will not be corrected by roll-forward/upgrade from a version prior to the fix.

Workaround

As a workaround, to prevent signatures from being added to these Signature Sets in the future, use the following SQL: ---------------------------------------------------------------------- DELETE FROM PLC.NEGSIG_SET_FILTERS where set_id in (SELECT set_id FROM PLC.NEGSIG_SETS where flg_is_manual = 1) ---------------------------------------------------------------------- Alternatively, delete the affected Signature Set and re-create as manual.

Fix Information

Pre-existing, corrupted, user-defined (manual) signature sets are now corrected after upgrading from an older version.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips