Bug ID 524009: Incorrect parsing of abnormal request headers during DOS attacks

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0

Opened: May 19, 2015

Severity: 4-Minor

Symptoms

When the DOS profile is in use, and a client-side mitigation is active, in some rare cases the request headers were parsed incorrectly, causing valid requests to be reset.

Impact

Some valid requests are blocked during the client-side DOS mitigation.

Conditions

DOS profile is used, DOS attack is active and mitigated using Client-Side Integrity. This is only relevant for the requests which are marked for DOS mitigation.

Workaround

None

Fix Information

When mitigating a DOS attack using the Client-Side mitigation, requests with abnormal headers are no longer blocked.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips