Show plain JSON{"id": "CVE-2018-5814", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.9, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.0, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.0}]}, "published": "2018-06-12T16:29:00.673", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://www.securitytracker.com/id/1041050", "tags": ["Third Party Advisory", "VDB Entry"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43", "tags": ["Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11", "tags": ["Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133", "tags": ["Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102", "tags": ["Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=22076557b07c12086eeb16b8ce2b0b735f7a27e7", "tags": ["Patch", "Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=c171654caa875919be3c533d3518da8be5be966e", "tags": ["Patch", "Vendor Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://secuniaresearch.flexerasoftware.com/advisories/81540/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-8/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://usn.ubuntu.com/3696-1/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://usn.ubuntu.com/3696-2/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://usn.ubuntu.com/3752-1/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://usn.ubuntu.com/3752-2/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://usn.ubuntu.com/3752-3/", "tags": ["Third Party Advisory"], "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1041050", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=22076557b07c12086eeb16b8ce2b0b735f7a27e7", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=c171654caa875919be3c533d3518da8be5be966e", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://secuniaresearch.flexerasoftware.com/advisories/81540/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-8/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3696-1/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3696-2/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3752-1/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3752-2/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3752-3/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-362"}]}], "descriptions": [{"lang": "en", "value": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets."}, {"lang": "es", "value": "En el kernel de Linux en versiones anteriores a la 4.16.11, 4.14.43, 4.9.102 y 4.4.133, m\u00faltiples errores de condici\u00f3n de carrera al gestionar operaciones probe, disconnect y rebind pueden explotarse para desencadenar una condici\u00f3n de uso de memoria previamente liberada o una desreferencia de puntero NULL mediante el env\u00edo de m\u00faltiples paquetes USB por IP."}], "lastModified": "2024-11-21T04:09:27.807", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8141676-C4C2-42DB-AE65-1EB45CE87ACC", "versionEndExcluding": "4.4.133"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D2F0532-C62A-4643-9D48-119A785DF601", "versionEndIncluding": "4.9.102", "versionStartIncluding": "4.5"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD11757E-8375-4A38-AE5D-DD107D82C226", "versionEndIncluding": "4.14.43", "versionStartIncluding": "4.10"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93416098-8105-41F1-8E67-B47D57289F33", "versionEndIncluding": "4.16.11", "versionStartIncluding": "4.15"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"}], "operator": "OR"}]}], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com"}