Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-5392
HistoryAug 14, 2018 - 12:00 a.m.

CVE-2018-5392

2018-08-1400:00:00
ubuntu.com
ubuntu.com
9

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

37.1%

mingw-w64 version 5.0.4 by default produces executables that opt in to
ASLR, but are not compatible with ASLR. ASLR is an exploit mitigation
technique used by modern Windows platforms. For ASLR to function, Windows
executables must contain a relocations table. Despite containing the
“Dynamic base” PE header, which indicates ASLR compatibility, Windows
executables produced by mingw-w64 have the relocations table stripped from
them by default. This means that executables produced by mingw-w64 are
vulnerable to return-oriented programming (ROP) attacks. Windows
executables generated by mingw-w64 claim to be ASLR compatible, but are
not. Vulnerabilities in such executables are more easily exploitable as a
result.

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

37.1%