U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2013-3587

Change History

Initial Analysis by NIST 3/05/2020 10:22:56 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:* versions from (including) 5.0.0 up to (including) 5.3.1
     *cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (including) 6.4.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 11.3.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 11.4.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 9.2.0 up to (including) 9.4.8
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 9.2.2 up to (including) 9.4.8
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (including) 9.6.1
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 11.3.0 up to (including) 11.6.1
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (including) 12.1.2
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 9.4.5 up to (including) 9.4.8
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.4.1
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 9.4.0 up to (including) 9.4.8
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:firepass:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (including) 6.1.0
     *cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Added CWE

								
							
							
						
NIST CWE-200
Changed Reference Type
http://breachattack.com/ No Types Assigned
http://breachattack.com/ Third Party Advisory
Changed Reference Type
http://github.com/meldium/breach-mitigation-rails No Types Assigned
http://github.com/meldium/breach-mitigation-rails Third Party Advisory
Changed Reference Type
http://security.stackexchange.com/questions/20406/is-http-compression-safe#20407 No Types Assigned
http://security.stackexchange.com/questions/20406/is-http-compression-safe#20407 Exploit, Third Party Advisory
Changed Reference Type
http://slashdot.org/story/13/08/05/233216 No Types Assigned
http://slashdot.org/story/13/08/05/233216 Third Party Advisory
Changed Reference Type
http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf No Types Assigned
http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf Third Party Advisory
Changed Reference Type
http://www.kb.cert.org/vuls/id/987798 No Types Assigned
http://www.kb.cert.org/vuls/id/987798 Third Party Advisory, US Government Resource
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=995168 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=995168 Issue Tracking, Third Party Advisory
Changed Reference Type
https://hackerone.com/reports/254895 No Types Assigned
https://hackerone.com/reports/254895 Exploit, Third Party Advisory
Changed Reference Type
https://support.f5.com/csp/article/K14634 No Types Assigned
https://support.f5.com/csp/article/K14634 Third Party Advisory
Changed Reference Type
https://www.blackhat.com/us-13/briefings.html#Prado No Types Assigned
https://www.blackhat.com/us-13/briefings.html#Prado Third Party Advisory
Changed Reference Type
https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/ No Types Assigned
https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/ Third Party Advisory