{"vuid":"VU#146430","idnumber":"146430","name":"F5 Networks BIG-IP Edge Client information leakage vulnerability","keywords":["f5","networks","big-ip","edge","client","information","leakage","cwe-200"],"overview":"F5 Networks has reported a flaw in the BIG-IP APM and the FirePass client-side F5-signed Edge Client components. The components may leak information from memory. (CWE-200)","clean_desc":"F5 Networks has reported a flaw in the BIG-IP APM and the FirePass client-side F5-signed Edge Client components. The components may leak information from memory. Additional details may be found in the F5 SOL14969 security advisory.","impact":"A local attacker may be able to access sensitive information from Edge Client memory.","resolution":"Apply an Update Users should check the F5 SOL14969 security advisory to see if their product is vulnerable and to receive a patch.","workarounds":"","sysaffected":"","thanks":"Thanks to Giorgio Casali and Simone Cecchini with Verizon Enterprise Solutions GCIS Threat and Vulnerability Management for discovering this vulnerability.","author":"This document was written by Jared Allar.","public":["http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14969.html?sr=34905674-","http://cwe.mitre.org/data/definitions/200.html"],"cveids":["CVE-2013-6024"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-10-15T13:14:47Z","publicdate":"2013-02-04T00:00:00Z","datefirstpublished":"2014-02-06T19:01:47Z","dateupdated":"2014-02-06T19:01:48Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"1","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"MH","cvss_targetdistribution":"H","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.4","cvss_basevector":"AV:L/AC:M/Au:S/C:C/I:N/A:N","cvss_temporalscore":"3.6","cvss_environmentalscore":"6.1588191319744","cvss_environmentalvector":"CDP:MH/TD:H/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}