7.8

CVE-2018-5391

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 3.9 <= 4.18
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
MicrosoftWindows 10 Version-
MicrosoftWindows 10 Version1607
MicrosoftWindows 10 Version1703
MicrosoftWindows 10 Version1709
MicrosoftWindows 10 Version1803
MicrosoftWindows 7 Version- Updatesp1
MicrosoftWindows 8.1 Version-
MicrosoftWindows Rt 8.1 Version-
MicrosoftWindows Server 2008 Version- Updatesp2
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
MicrosoftWindows Server 2008 Versionr2 Updatesp1 SwPlatformitanium
MicrosoftWindows Server 2016 Version1709
MicrosoftWindows Server 2016 Version1803
F5Big-ip Access Policy Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Access Policy Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Access Policy Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Advanced Firewall Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Advanced Firewall Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Advanced Firewall Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Analytics Version >= 11.5.1 < 11.6.5.1
F5Big-ip Analytics Version >= 12.1.0 < 12.1.5
F5Big-ip Analytics Version >= 13.0.0 < 13.1.3
F5Big-ip Analytics Version >= 14.0.0 < 14.0.1.1
F5Big-ip Analytics Version >= 14.1.0 < 14.1.2.4
F5Big-ip Application Acceleration Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Application Acceleration Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Application Acceleration Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Application Security Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Application Security Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Application Security Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Application Security Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Domain Name System Version >= 11.5.1 < 11.6.5.1
F5Big-ip Domain Name System Version >= 12.1.0 < 12.1.5
F5Big-ip Domain Name System Version >= 13.0.0 < 13.1.3
F5Big-ip Domain Name System Version >= 14.0.0 < 14.0.1.1
F5Big-ip Domain Name System Version >= 14.1.0 < 14.1.2.4
F5Big-ip Edge Gateway Version >= 11.5.1 < 11.6.5.1
F5Big-ip Edge Gateway Version >= 12.1.0 < 12.1.5
F5Big-ip Edge Gateway Version >= 13.0.0 < 13.1.3
F5Big-ip Edge Gateway Version >= 14.0.0 < 14.0.1.1
F5Big-ip Edge Gateway Version >= 14.1.0 < 14.1.2.4
F5Big-ip Fraud Protection Service Version >= 11.5.1 < 11.6.5.1
F5Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5
F5Big-ip Fraud Protection Service Version >= 13.0.0 < 13.1.3
F5Big-ip Fraud Protection Service Version >= 14.0.0 < 14.0.1.1
F5Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.2.4
F5Big-ip Global Traffic Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Global Traffic Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Global Traffic Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Link Controller Version >= 11.5.1 < 11.6.5.1
F5Big-ip Link Controller Version >= 12.1.0 < 12.1.5
F5Big-ip Link Controller Version >= 13.0.0 < 13.1.3
F5Big-ip Link Controller Version >= 14.0.0 < 14.0.1.1
F5Big-ip Link Controller Version >= 14.1.0 < 14.1.2.4
F5Big-ip Local Traffic Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Local Traffic Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Local Traffic Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Policy Enforcement Manager Version >= 11.5.1 < 11.6.5.1
F5Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5
F5Big-ip Policy Enforcement Manager Version >= 13.0.0 < 13.1.3
F5Big-ip Policy Enforcement Manager Version >= 14.0.0 < 14.0.1.1
F5Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.2.4
F5Big-ip Webaccelerator Version >= 11.5.1 < 11.6.5.1
F5Big-ip Webaccelerator Version >= 12.1.0 < 12.1.5
F5Big-ip Webaccelerator Version >= 13.0.0 < 13.1.3
F5Big-ip Webaccelerator Version >= 14.0.0 < 14.0.1.1
F5Big-ip Webaccelerator Version >= 14.1.0 < 14.1.2.4
SiemensRuggedcom Rm1224 Firmware Version < 6.1
   SiemensRuggedcom Rm1224 Version-
SiemensRuggedcom Rox Ii Firmware Version < 2.13.3
   SiemensRuggedcom Rox Ii Version-
SiemensScalance M-800 Firmware Version < 6.1
   SiemensScalance M-800 Version-
SiemensScalance S615 Firmware Version < 6.1
   SiemensScalance S615 Version-
SiemensScalance Sc-600 Firmware Version < 2.0
   SiemensScalance Sc-600 Version-
SiemensSimatic Rf185c Firmware Version < 1.3
   SiemensSimatic Rf185c Version-
SiemensSimatic Rf186c Firmware Version < 1.3
   SiemensSimatic Rf186c Version-
SiemensSimatic Rf186ci Firmware Version < 1.3
   SiemensSimatic Rf186ci Version-
SiemensSimatic Rf188 Firmware Version < 1.3
   SiemensSimatic Rf188 Version-
SiemensSimatic Rf188ci Firmware Version < 1.3
   SiemensSimatic Rf188ci Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.82% 0.877
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
Third Party Advisory
Mailing List
Mitigation
https://usn.ubuntu.com/3742-1/
Third Party Advisory
https://usn.ubuntu.com/3742-2/
Third Party Advisory
https://usn.ubuntu.com/3741-1/
Third Party Advisory
https://usn.ubuntu.com/3741-2/
Third Party Advisory
https://usn.ubuntu.com/3740-1/
Third Party Advisory
https://usn.ubuntu.com/3740-2/
Third Party Advisory
http://www.securityfocus.com/bid/105108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1041476
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1041637
Third Party Advisory
VDB Entry
https://www.debian.org/security/2018/dsa-4272
Third Party Advisory
Mitigation
https://www.kb.cert.org/vuls/id/641765
Third Party Advisory
US Government Resource