cpe:/a:f5:big-ip_access_policy_manager:12.1.0 cpe:/a:f5:big-ip_access_policy_manager:12.1.1 cpe:/a:f5:big-ip_access_policy_manager:12.1.2 cpe:/a:f5:big-ip_access_policy_manager:13.0.0 cpe:/a:f5:big-ip_advanced_firewall_manager:12.1.0 cpe:/a:f5:big-ip_advanced_firewall_manager:12.1.1 cpe:/a:f5:big-ip_advanced_firewall_manager:12.1.2 cpe:/a:f5:big-ip_advanced_firewall_manager:13.0.0 cpe:/a:f5:big-ip_analytics:12.1.0 cpe:/a:f5:big-ip_analytics:12.1.1 cpe:/a:f5:big-ip_analytics:12.1.2 cpe:/a:f5:big-ip_analytics:13.0.0 cpe:/a:f5:big-ip_application_acceleration_manager:12.1.0 cpe:/a:f5:big-ip_application_acceleration_manager:12.1.1 cpe:/a:f5:big-ip_application_acceleration_manager:12.1.2 cpe:/a:f5:big-ip_application_acceleration_manager:13.0.0 cpe:/a:f5:big-ip_application_security_manager:12.1.0 cpe:/a:f5:big-ip_application_security_manager:12.1.1 cpe:/a:f5:big-ip_application_security_manager:12.1.2 cpe:/a:f5:big-ip_application_security_manager:13.0.0 cpe:/a:f5:big-ip_dns:13.0.0 cpe:/a:f5:big-ip_global_traffic_manager:12.1.0 cpe:/a:f5:big-ip_global_traffic_manager:12.1.1 cpe:/a:f5:big-ip_global_traffic_manager:12.1.2 cpe:/a:f5:big-ip_global_traffic_manager:13.0.0 cpe:/a:f5:big-ip_link_controller:12.1.0 cpe:/a:f5:big-ip_link_controller:12.1.1 cpe:/a:f5:big-ip_link_controller:12.1.2 cpe:/a:f5:big-ip_link_controller:13.0.0 cpe:/a:f5:big-ip_local_traffic_manager:12.1.0 cpe:/a:f5:big-ip_local_traffic_manager:12.1.1 cpe:/a:f5:big-ip_local_traffic_manager:12.1.2 cpe:/a:f5:big-ip_local_traffic_manager:13.0.0 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.0 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.1 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.2 cpe:/a:f5:big-ip_policy_enforcement_manager:13.0.0 cpe:/a:f5:big-ip_websafe:12.1.0 cpe:/a:f5:big-ip_websafe:12.1.1 cpe:/a:f5:big-ip_websafe:12.1.2 cpe:/a:f5:big-ip_websafe:13.0.0 CVE-2017-6138 2017-12-21T12:29:00.527-05:00 2018-01-05T10:33:29.880-05:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2018-01-04T15:33:25.937-05:00 SECTRACK 1040051 CONFIRM https://support.f5.com/csp/article/K34514540 In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with BIG-IP APM profiles, regardless of settings. The issue is also exposed with the non-default "normalize URI" configuration options used in iRules and/or BIG-IP LTM policies.