Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2018-16880 First vendor Publication 2019-01-29
Vendor Cve Last vendor Modification 2023-07-19

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7
Base Score 7 Environmental Score 7
impact SubScore 5.9 Temporal Score 7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16880

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 2
Os 3265

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/106735
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880
https://support.f5.com/csp/article/K03593314
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html
UBUNTU https://usn.ubuntu.com/3903-1/
https://usn.ubuntu.com/3903-2/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-03-12 12:50:22
  • Multiple Updates
2024-02-02 01:54:20
  • Multiple Updates
2024-02-01 12:14:58
  • Multiple Updates
2023-12-29 01:48:37
  • Multiple Updates
2023-11-22 01:48:08
  • Multiple Updates
2023-09-05 12:52:09
  • Multiple Updates
2023-09-05 01:14:41
  • Multiple Updates
2023-09-02 12:51:43
  • Multiple Updates
2023-09-02 01:14:58
  • Multiple Updates
2023-08-12 12:55:28
  • Multiple Updates
2023-08-12 01:14:15
  • Multiple Updates
2023-08-11 12:49:33
  • Multiple Updates
2023-08-11 01:14:38
  • Multiple Updates
2023-08-06 12:48:04
  • Multiple Updates
2023-08-06 01:14:13
  • Multiple Updates
2023-08-04 12:48:18
  • Multiple Updates
2023-08-04 01:14:19
  • Multiple Updates
2023-07-19 09:27:34
  • Multiple Updates
2021-05-04 13:10:54
  • Multiple Updates
2021-04-22 02:24:30
  • Multiple Updates
2020-05-23 01:09:34
  • Multiple Updates
2019-05-16 21:19:30
  • Multiple Updates
2019-04-23 21:19:14
  • Multiple Updates
2019-04-20 00:19:08
  • Multiple Updates
2019-04-16 09:18:55
  • Multiple Updates
2019-03-08 21:19:44
  • Multiple Updates
2019-03-07 17:19:26
  • Multiple Updates
2019-02-04 21:19:18
  • Multiple Updates
2019-01-30 21:18:43
  • Multiple Updates
2019-01-29 21:19:11
  • First insertion