Bug ID 692557: When BIG-IP as SAML IdP processes signed authentication requests from external SAML SP, a block of memory may become corrupted.

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3

Fixed In:
14.0.0, 13.1.0.4, 13.0.1

Opened: Nov 03, 2017

Severity: 2-Critical

Symptoms

After processing signed authentication requests from external SAML SP, SAML IdP may corrupt a block of tmm memory.

Impact

Various possible negative effects, including TMM core. Traffic disrupted while tmm restarts.

Conditions

- BIG-IP system is configured as SAML IdP. - IdP is configured with external SP's signing certificate. - External SP sends signed authentication request.

Workaround

None.

Fix Information

BIG-IP as SAML IdP no longer causes memory corruption when handling certain traffic.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips