Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-14842
HistoryNov 26, 2019 - 12:00 a.m.

CVE-2019-14842

2019-11-2600:00:00
ubuntu.com
ubuntu.com
7

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.9%

Structured reply is a feature of the newstyle NBD protocol allowing the
server to send a reply in chunks. A bounds check which was supposed to test
for chunk offsets smaller than the beginning of the request did not work
because of signed/unsigned confusion. If one of these chunks contains a
negative offset then data under control of the server is written to memory
before the read buffer supplied by the client. If the read buffer is
located on the stack then this allows the stack return address from
nbd_pread() to be trivially modified, allowing arbitrary code execution
under the control of the server. If the buffer is located on the heap then
other memory objects before the buffer can be overwritten, which again
would usually lead to arbitrary code execution.

Bugs

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.9%