Lucene search

K
cvelistCanonicalCVELIST:CVE-2019-11477
HistoryJun 17, 2019 - 12:00 a.m.

CVE-2019-11477 Integer overflow in TCP_SKB_CB(skb)->tcp_gso_segs

2019-06-1700:00:00
CWE-190
canonical
www.cve.org
2

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.972

Percentile

99.8%

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CNA Affected

[
  {
    "product": "Linux kernel",
    "vendor": "Linux",
    "versions": [
      {
        "lessThan": "4.4.182",
        "status": "affected",
        "version": "4.4",
        "versionType": "custom"
      },
      {
        "lessThan": "4.9.182",
        "status": "affected",
        "version": "4.9",
        "versionType": "custom"
      },
      {
        "lessThan": "4.14.127",
        "status": "affected",
        "version": "4.14",
        "versionType": "custom"
      },
      {
        "lessThan": "4.19.52",
        "status": "affected",
        "version": "4.19",
        "versionType": "custom"
      },
      {
        "lessThan": "5.1.11",
        "status": "affected",
        "version": "5.1",
        "versionType": "custom"
      }
    ]
  }
]

References

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.972

Percentile

99.8%