CVE-2022-29491 - NULL Pointer Dereference

Severity

75%

Complexity

39%

Confidentiality

60%

On F5 BIG-IP LTM, Advanced WAF, ASM, or APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5, 14.1.x versions prior to 14.1.4.6, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a virtual server is configured with HTTP, TCP on one side (client/server), and DTLS on the other (server/client), undisclosed requests can cause the TMM process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS 3.1 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Demo Examples

NULL Pointer Dereference

CWE-476

While there are no complete fixes aside from conscientious programming, the following steps will go a long way to ensure that NULL pointer dereferences do not occur.


               
}
/* make use of pointer1 *//* ... */

If you are working with a multithreaded or otherwise asynchronous environment, ensure that proper locking APIs are used to lock before the if statement; and unlock when it has finished.

NULL Pointer Dereference

CWE-476

This example takes an IP address from a user, verifies that it is well formed and then looks up the hostname and copies it into a buffer.


               
}
strcpy(hostname, hp->h_name);/*routine that ensures user_supplied_addr is in the right format for conversion */

If an attacker provides an address that appears to be well-formed, but the address does not resolve to a hostname, then the call to gethostbyaddr() will return NULL. Since the code does not check the return value from gethostbyaddr (CWE-252), a NULL pointer dereference would then occur in the call to strcpy().

Note that this example is also vulnerable to a buffer overflow (see CWE-119).

NULL Pointer Dereference

CWE-476

In the following code, the programmer assumes that the system always has a property named "cmd" defined. If an attacker can control the program's environment so that "cmd" is not defined, the program throws a NULL pointer exception when it attempts to call the trim() method.


               
cmd = cmd.trim();

NULL Pointer Dereference

CWE-476

This application has registered to handle a URL when sent an intent:


               
}......
}
}
int length = URL.length();
...

The application assumes the URL will always be included in the intent. When the URL is not present, the call to getStringExtra() will return null, thus causing a null pointer exception when length() is called.

Overview

Type

F5

First reported 2 years ago

2022-05-05 17:15:00

Last updated 2 years ago

2022-05-12 20:58:00

Affected Software

F5 Networks BIG-IP Local Traffic Manager 11.6.1

11.6.1

F5 Big-IP Local Traffic Manager (LTM) 12.1.2

12.1.2

F5 Big-IP Access Policy Manager (APM) 12.1.2

12.1.2

F5 BIG-IP Application Security Manager (ASM) 12.1.1

12.1.1

F5 BIG-IP Local Traffic Manager (LTM) 12.1.0

12.1.0

F5 BIG-IP Access Policy Manager (APM) 12.1.1

12.1.1

F5 BIG-IP Application Security Manager (ASM) 12.1.0

12.1.0

F5 Networks BIG-IP Application Security Manager 11.6.1

11.6.1

F5 BIG-IP Access Policy Manager (APM) 12.1.0

12.1.0

F5 BIG-IP Local Traffic Manager (LTM) 12.1.1

12.1.1

F5 Networks BIG-IP Access Policy Manager 11.6.1

11.6.1

F5 Big-IP Access Policy Manager (APM) 13.1.0

13.1.0

F5 BIG-IP Access Policy Manager (APM) 14.1.0

14.1.0

F5 BIG-IP Access Policy Manager (APM) 15.1.0

15.1.0

F5 Big-IP Application Security Manager (ASM) 12.1.2

12.1.2

F5 Big-IP Application Security Manager (ASM) 13.1.0

13.1.0

F5 BIG-IP Application Security Manager 14.1.0

14.1.0

F5 BIG-IP Application Security Manager (ASM) 15.1.0

15.1.0

F5 Big-IP Local Traffic Manager (LTM) 13.1.0

13.1.0

F5 BIG-IP Local Traffic Manager 14.1.0

14.1.0

F5 BIG-IP Local Traffic Manager (LTM) 15.1.0

15.1.0

F5 Big-IP Access Policy Manager (APM) 11.6.2

11.6.2

F5 Big-IP Access Policy Manager (APM) 11.6.3

11.6.3

F5 BIG-IP Access Policy Manager (APM) 11.6.4

11.6.4

F5 Big-IP Access Policy Manager (APM) 11.6.5

11.6.5

F5 Big-IP Access Policy Manager (APM) 12.1.3

12.1.3

F5 BIG-IP Access Policy Manager (APM) 12.1.4

12.1.4

F5 Big-IP Access Policy Manager (APM) 12.1.5

12.1.5

F5 Big-IP Access Policy Manager (APM) 13.1.1

13.1.1

F5 BIG-IP Access Policy Manager (APM) 13.1.3

13.1.3

F5 Big-IP Access Policy Manager (APM) 14.1.2

14.1.2

F5 Big-IP Application Security Manager (ASM) 12.1.3

12.1.3

F5 BIG-IP Application Security Manager 12.1.4

12.1.4

F5 Big-IP Application Security Manager (ASM) 12.1.5

12.1.5

F5 Big-IP Application Security Manager (ASM) 13.1.1

13.1.1

F5 Big-IP Application Security Manager (ASM) 13.1.3

13.1.3

F5 Big-IP Application Security Manager (ASM) 14.1.2

14.1.2

F5 Big-IP Application Security Manager (ASM) 11.6.2

11.6.2

F5 Big-IP Application Security Manager (ASM) 11.6.3

11.6.3

F5 BIG-IP Application Security Manager (ASM) 11.6.4

11.6.4

F5 Big-IP Application Security Manager (ASM) 11.6.5

11.6.5

F5 Big-IP Local Traffic Manager (LTM) 11.6.2

11.6.2

F5 Big-IP Local Traffic Manager (LTM) 11.6.3

11.6.3

F5 BIG-IP Local Traffic Manager (LTM) 11.6.4

11.6.4

F5 Big-IP Local Traffic Manager (LTM) 11.6.5

11.6.5

F5 Big-IP Local Traffic Manager (LTM) 12.1.3

12.1.3

F5 BIG-IP Local Traffic Manager 12.1.4

12.1.4

F5 Big-IP Local Traffic Manager (LTM) 12.1.5

12.1.5

F5 Big-IP Local Traffic Manager (LTM) 13.1.1

13.1.1

F5 BIG-IP Local Traffic Manager (LTM) 13.1.3

13.1.3

F5 BIG-IP Local Traffic Manager (LTM) 14.1.2

14.1.2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.