cpe:/a:f5:big-ip_access_policy_manager:11.5.4 cpe:/a:f5:big-ip_advanced_firewall_manager:11.5.4 cpe:/a:f5:big-ip_analytics:11.5.4 cpe:/a:f5:big-ip_application_acceleration_manager:11.5.4 cpe:/a:f5:big-ip_application_security_manager:11.5.4 cpe:/a:f5:big-ip_global_traffic_manager:11.5.4 cpe:/a:f5:big-ip_link_controller:11.5.4 cpe:/a:f5:big-ip_local_traffic_manager:11.5.4 cpe:/a:f5:big-ip_policy_enforcement_manager:11.5.4 CVE-2016-4545 2016-06-07T14:59:04.603-04:00 2016-06-09T07:35:51.183-04:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2016-06-08T08:18:51.750-04:00 SECTRACK 1036025 CONFIRM https://support.f5.com/kb/en-us/solutions/public/k/48/sol48042976.html Virtual servers in F5 BIG-IP 11.5.4, when SSL profiles are enabled, allow remote attackers to cause a denial of service (resource consumption and Traffic Management Microkernel restart) via an SSL alert during the handshake.