Bug ID 692557: When BIG-IP as SAML IdP processes signed authentication requests from external SAML SP, a block of memory may become corrupted.

Last Modified: May 14, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP APM(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3

Fixed In:
14.0.0, 13.1.0.4, 13.0.1

Opened: Nov 03, 2017
Severity: 2-Critical

Symptoms

After processing signed authentication requests from external SAML SP, SAML IdP may corrupt a block of tmm memory.

Impact

Various possible negative effects, including TMM core. Traffic disrupted while tmm restarts.

Conditions

- BIG-IP system is configured as SAML IdP. - IdP is configured with external SP's signing certificate. - External SP sends signed authentication request.

Workaround

None.

Fix Information

BIG-IP as SAML IdP no longer causes memory corruption when handling certain traffic.

Behavior Change