Lucene search

K
nvd[email protected]NVD:CVE-2019-11479
HistoryJun 19, 2019 - 12:15 a.m.

CVE-2019-11479

2019-06-1900:15:12
CWE-405
CWE-770
web.nvd.nist.gov
2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.1 Medium

AI Score

Confidence

High

0.974 High

EPSS

Percentile

99.9%

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

Affected configurations

NVD
Node
linuxlinux_kernelRange4.44.4.182
OR
linuxlinux_kernelRange4.94.9.182
OR
linuxlinux_kernelRange4.144.14.127
OR
linuxlinux_kernelRange4.194.19.52
OR
linuxlinux_kernelRange5.15.1.11
Node
f5big-ip_advanced_firewall_managerRange11.5.211.6.5.1
OR
f5big-ip_advanced_firewall_managerRange12.1.012.1.5.1
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.3.2
OR
f5big-ip_advanced_firewall_managerRange14.0.014.0.1.1
OR
f5big-ip_advanced_firewall_managerRange14.1.214.1.2.1
OR
f5big-ip_advanced_firewall_managerRange15.0.015.0.1.1
Node
f5big-ip_access_policy_managerRange11.5.211.6.5.1
OR
f5big-ip_access_policy_managerRange12.1.012.1.5.1
OR
f5big-ip_access_policy_managerRange13.1.013.1.3.2
OR
f5big-ip_access_policy_managerRange14.0.014.0.1.1
OR
f5big-ip_access_policy_managerRange14.1.214.1.2.1
OR
f5big-ip_access_policy_managerRange15.0.015.0.1.1
Node
f5big-ip_application_acceleration_managerRange11.5.211.6.5.1
OR
f5big-ip_application_acceleration_managerRange12.1.012.1.5.1
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.3.2
OR
f5big-ip_application_acceleration_managerRange14.0.014.0.1.1
OR
f5big-ip_application_acceleration_managerRange14.1.214.1.2.1
OR
f5big-ip_application_acceleration_managerRange15.0.015.0.1.1
Node
f5big-ip_link_controllerRange11.5.211.6.5.1
OR
f5big-ip_link_controllerRange12.1.012.1.5.1
OR
f5big-ip_link_controllerRange13.1.013.1.3.2
OR
f5big-ip_link_controllerRange14.0.014.0.1.1
OR
f5big-ip_link_controllerRange14.1.214.1.2.1
OR
f5big-ip_link_controllerRange15.0.015.0.1.1
Node
f5big-ip_policy_enforcement_managerRange11.5.211.6.5.1
OR
f5big-ip_policy_enforcement_managerRange12.1.012.1.5.1
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.3.2
OR
f5big-ip_policy_enforcement_managerRange14.0.014.0.1.1
OR
f5big-ip_policy_enforcement_managerRange14.1.214.1.2.1
OR
f5big-ip_policy_enforcement_managerRange15.0.015.0.1.1
Node
f5big-ip_webacceleratorRange11.5.211.6.5.1
OR
f5big-ip_webacceleratorRange12.1.012.1.5.1
OR
f5big-ip_webacceleratorRange13.1.013.1.3.2
OR
f5big-ip_webacceleratorRange14.0.014.0.1.1
OR
f5big-ip_webacceleratorRange14.1.214.1.2.1
OR
f5big-ip_webacceleratorRange15.0.015.0.1.1
Node
f5big-ip_application_security_managerRange11.5.211.6.5.1
OR
f5big-ip_application_security_managerRange12.1.012.1.5.1
OR
f5big-ip_application_security_managerRange13.1.013.1.3.2
OR
f5big-ip_application_security_managerRange14.0.014.0.1.1
OR
f5big-ip_application_security_managerRange14.1.214.1.2.1
OR
f5big-ip_application_security_managerRange15.0.015.0.1.1
Node
f5big-ip_local_traffic_managerRange11.5.211.6.5.1
OR
f5big-ip_local_traffic_managerRange12.1.012.1.5.1
OR
f5big-ip_local_traffic_managerRange13.1.013.1.3.2
OR
f5big-ip_local_traffic_managerRange14.0.014.0.1.1
OR
f5big-ip_local_traffic_managerRange14.1.214.1.2.1
OR
f5big-ip_local_traffic_managerRange15.0.015.0.1.1
Node
f5big-ip_fraud_protection_serviceRange11.5.211.6.5.1
OR
f5big-ip_fraud_protection_serviceRange12.1.012.1.5.1
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.3.2
OR
f5big-ip_fraud_protection_serviceRange14.0.014.0.1.1
OR
f5big-ip_fraud_protection_serviceRange14.1.214.1.2.1
OR
f5big-ip_fraud_protection_serviceRange15.0.015.0.1.1
Node
f5big-ip_global_traffic_managerRange11.5.211.6.5.1
OR
f5big-ip_global_traffic_managerRange12.1.012.1.5.1
OR
f5big-ip_global_traffic_managerRange13.1.013.1.3.2
OR
f5big-ip_global_traffic_managerRange14.0.014.0.1.1
OR
f5big-ip_global_traffic_managerRange14.1.214.1.2.1
OR
f5big-ip_global_traffic_managerRange15.0.015.0.1.1
Node
f5big-ip_analyticsRange11.5.211.6.5.1
OR
f5big-ip_analyticsRange12.1.012.1.5.1
OR
f5big-ip_analyticsRange13.1.013.1.3.2
OR
f5big-ip_analyticsRange14.0.014.0.1.1
OR
f5big-ip_analyticsRange14.1.214.1.2.1
OR
f5big-ip_analyticsRange15.0.015.0.1.1
Node
f5big-ip_edge_gatewayRange11.5.211.6.5.1
OR
f5big-ip_edge_gatewayRange12.1.012.1.5.1
OR
f5big-ip_edge_gatewayRange13.1.013.1.3.2
OR
f5big-ip_edge_gatewayRange14.0.014.0.1.1
OR
f5big-ip_edge_gatewayRange14.1.214.1.2.1
OR
f5big-ip_edge_gatewayRange15.0.015.0.1.1
Node
f5big-ip_domain_name_systemRange11.5.211.6.5.1
OR
f5big-ip_domain_name_systemRange12.1.012.1.5.1
OR
f5big-ip_domain_name_systemRange13.1.013.1.3.2
OR
f5big-ip_domain_name_systemRange14.0.014.0.1.1
OR
f5big-ip_domain_name_systemRange14.1.214.1.2.1
OR
f5big-ip_domain_name_systemRange15.0.015.0.1.1
Node
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch18.04lts
OR
canonicalubuntu_linuxMatch18.10
OR
canonicalubuntu_linuxMatch19.04
Node
redhatenterprise_linuxMatch7.0
Node
f5big-iq_centralized_managementRange5.1.05.4.0
OR
f5big-iq_centralized_managementRange6.0.06.1.0
OR
f5enterprise_managerMatch3.1.1
OR
f5iworkflowMatch2.3.0
OR
f5traffix_signaling_delivery_controllerRange5.0.05.1.0
Node
redhatvirtualization_hostMatch4.0
AND
redhatenterprise_linuxMatch7.0

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.1 Medium

AI Score

Confidence

High

0.974 High

EPSS

Percentile

99.9%