6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.6%
It was discovered that elfutils incorrectly handled certain malformed
files. If a user or automated system were tricked into processing a
specially crafted file, elfutils could be made to crash or consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS. (CVE-2018-16062, CVE-2018-16403, CVE-2018-18310,
CVE-2018-18520, CVE-2018-18521, CVE-2019-7149, CVE-2019-7150,
CVE-2019-7665)
It was discovered that elfutils incorrectly handled bounds checks in
certain functions when processing malformed files. If a user or automated
system were tricked into processing a specially crafted file, elfutils
could be made to crash or consume resources, resulting in a denial of
service. (CVE-2020-21047, CVE-2021-33294)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | elfutils | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | elfutils-dbgsym | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libasm-dev | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libasm1 | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libasm1-dbgsym | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libdw-dev | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libdw1 | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libdw1-dbgsym | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libelf-dev | < 0.176-1.1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libelf1 | < 0.176-1.1ubuntu0.1 | UNKNOWN |
ubuntu.com/security/CVE-2018-16062
ubuntu.com/security/CVE-2018-16403
ubuntu.com/security/CVE-2018-18310
ubuntu.com/security/CVE-2018-18520
ubuntu.com/security/CVE-2018-18521
ubuntu.com/security/CVE-2019-7149
ubuntu.com/security/CVE-2019-7150
ubuntu.com/security/CVE-2019-7665
ubuntu.com/security/CVE-2020-21047
ubuntu.com/security/CVE-2021-33294
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.6%