Lucene search

K
cve[email protected]CVE-2018-8822
HistoryMar 20, 2018 - 5:29 p.m.

CVE-2018-8822

2018-03-2017:29:00
CWE-119
web.nvd.nist.gov
222
cve-2018-8822
linux kernel
buffer length handling
ncp_read_kernel
ncpfs
exploit
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

28.1%

Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.123.2.102
OR
linuxlinux_kernelRange3.33.16.57
OR
linuxlinux_kernelRange3.173.18.103
OR
linuxlinux_kernelRange3.194.1.52
OR
linuxlinux_kernelRange4.24.4.125
OR
linuxlinux_kernelRange4.54.9.91
OR
linuxlinux_kernelRange4.104.14.31
OR
linuxlinux_kernelRange4.154.15.14
OR
linuxlinux_kernelMatch4.16rc
OR
linuxlinux_kernelMatch4.16rc1
OR
linuxlinux_kernelMatch4.16rc2
OR
linuxlinux_kernelMatch4.16rc3
OR
linuxlinux_kernelMatch4.16rc4
OR
linuxlinux_kernelMatch4.16rc5
OR
linuxlinux_kernelMatch4.16rc6
Node
canonicalubuntu_linuxMatch12.04esm
OR
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch17.10
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

28.1%