Description
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27088 | On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K44808538 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-04T08:47:40.736Z
Reserved: 2020-01-06T00:00:00.000Z
Link: CVE-2020-5934
No data.
Status : Modified
Published: 2020-10-29T16:15:15.587
Modified: 2024-11-21T05:34:51.433
Link: CVE-2020-5934
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD