7.8
CVE-2018-5391
- EPSS 3.82%
- Veröffentlicht 06.09.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:08:43
- Quelle cret@cert.org
- Teams Watchlist Login
- Unerledigt Login
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.9 <= 4.18
Redhat ≫ Enterprise Linux Desktop Version6.0
Redhat ≫ Enterprise Linux Desktop Version7.0
Redhat ≫ Enterprise Linux Server Version6.0
Redhat ≫ Enterprise Linux Server Version7.0
Redhat ≫ Enterprise Linux Server Aus Version6.4
Redhat ≫ Enterprise Linux Server Aus Version6.5
Redhat ≫ Enterprise Linux Server Aus Version6.6
Redhat ≫ Enterprise Linux Server Aus Version7.2
Redhat ≫ Enterprise Linux Server Aus Version7.3
Redhat ≫ Enterprise Linux Server Aus Version7.4
Redhat ≫ Enterprise Linux Server Eus Version6.7
Redhat ≫ Enterprise Linux Server Eus Version7.3
Redhat ≫ Enterprise Linux Server Eus Version7.4
Redhat ≫ Enterprise Linux Server Eus Version7.5
Redhat ≫ Enterprise Linux Server Tus Version6.6
Redhat ≫ Enterprise Linux Server Tus Version7.2
Redhat ≫ Enterprise Linux Server Tus Version7.3
Redhat ≫ Enterprise Linux Server Tus Version7.4
Redhat ≫ Enterprise Linux Workstation Version6.0
Redhat ≫ Enterprise Linux Workstation Version7.0
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
Canonical ≫ Ubuntu Linux Version12.04 SwEditionesm
Canonical ≫ Ubuntu Linux Version14.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version16.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version18.04 SwEditionlts
Microsoft ≫ Windows 10 Version-
Microsoft ≫ Windows 10 Version1607
Microsoft ≫ Windows 10 Version1703
Microsoft ≫ Windows 10 Version1709
Microsoft ≫ Windows 10 Version1803
Microsoft ≫ Windows 8.1 Version-
Microsoft ≫ Windows Rt 8.1 Version-
Microsoft ≫ Windows Server 2008 Version- Updatesp2
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 SwPlatformitanium
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version-
Microsoft ≫ Windows Server 2016 Version1709
Microsoft ≫ Windows Server 2016 Version1803
F5 ≫ Big-ip Access Policy Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Access Policy Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Access Policy Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Analytics Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Analytics Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Analytics Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Analytics Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Analytics Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Application Security Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Application Security Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Application Security Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Domain Name System Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Domain Name System Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Domain Name System Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Edge Gateway Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Edge Gateway Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Edge Gateway Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Edge Gateway Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Edge Gateway Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Fraud Protection Service Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Fraud Protection Service Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Fraud Protection Service Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Global Traffic Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Global Traffic Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Global Traffic Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Link Controller Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Link Controller Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Link Controller Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Link Controller Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Link Controller Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Local Traffic Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Local Traffic Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Local Traffic Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.2.4
F5 ≫ Big-ip Webaccelerator Version >= 11.5.1 < 11.6.5.1
F5 ≫ Big-ip Webaccelerator Version >= 12.1.0 < 12.1.5
F5 ≫ Big-ip Webaccelerator Version >= 13.0.0 < 13.1.3
F5 ≫ Big-ip Webaccelerator Version >= 14.0.0 < 14.0.1.1
F5 ≫ Big-ip Webaccelerator Version >= 14.1.0 < 14.1.2.4
Siemens ≫ Ruggedcom Rm1224 Firmware Version < 6.1
Siemens ≫ Ruggedcom Rox Ii Firmware Version < 2.13.3
Siemens ≫ Scalance M-800 Firmware Version < 6.1
Siemens ≫ Scalance S615 Firmware Version < 6.1
Siemens ≫ Scalance Sc-600 Firmware Version < 2.0
Siemens ≫ Scalance W1700 Ieee 802.11ac Firmware Version < 2.0
Siemens ≫ Scalance W700 Ieee 802.11a/b/g/n Firmware Version < 6.4
Siemens ≫ Simatic Net Cp 1242-7 Firmware Version < 3.2
Siemens ≫ Simatic Net Cp 1243-1 Firmware Version < 3.2
Siemens ≫ Simatic Net Cp 1243-7 Lte Eu Firmware Version < 3.2
Siemens ≫ Simatic Net Cp 1243-7 Lte Us Firmware Version < 3.2
Siemens ≫ Simatic Net Cp 1243-8 Irc Firmware Version < 3.2
Siemens ≫ Simatic Net Cp 1542sp-1 Firmware Version < 2.1
Siemens ≫ Simatic Net Cp 1542sp-1 Irc Firmware Version < 2.1
Siemens ≫ Simatic Net Cp 1543-1 Firmware Version < 2.2
Siemens ≫ Simatic Net Cp 1543sp-1 Firmware Version < 2.1
Siemens ≫ Simatic Rf185c Firmware Version < 1.3
Siemens ≫ Simatic Rf186c Firmware Version < 1.3
Siemens ≫ Simatic Rf186ci Firmware Version < 1.3
Siemens ≫ Simatic Rf188 Firmware Version < 1.3
Siemens ≫ Simatic Rf188ci Firmware Version < 1.3
Siemens ≫ Sinema Remote Connect Server Firmware Version >= 1.1 < 2.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.82% | 0.877 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.