CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
87.0%
It was discovered that NASM incorrectly handled certain source files. If a
user or automated system were tricked into processing a specially crafted
source file, a remote attacker could use these issues to cause NASM to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
ubuntu.com/security/CVE-2017-10686
ubuntu.com/security/CVE-2017-11111
ubuntu.com/security/CVE-2017-14228
ubuntu.com/security/CVE-2017-17810
ubuntu.com/security/CVE-2017-17811
ubuntu.com/security/CVE-2017-17812
ubuntu.com/security/CVE-2017-17813
ubuntu.com/security/CVE-2017-17814
ubuntu.com/security/CVE-2017-17815
ubuntu.com/security/CVE-2017-17816
ubuntu.com/security/CVE-2017-17817
ubuntu.com/security/CVE-2017-17818
ubuntu.com/security/CVE-2017-17819
ubuntu.com/security/CVE-2017-17820
ubuntu.com/security/CVE-2018-8881
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
87.0%