9.8

CVE-2019-10126

A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.2 < 4.4.186
LinuxLinux Kernel Version >= 4.5 < 4.9.186
LinuxLinux Kernel Version >= 4.10 < 4.14.134
LinuxLinux Kernel Version >= 4.15 < 4.19.59
LinuxLinux Kernel Version >= 4.20 < 5.1.18
RedhatVirtualization Version4.0
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Aus Version8.2
RedhatEnterprise Linux Aus Version8.4
RedhatEnterprise Linux Eus Version7.7
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
OpensuseLeap Version15.0
OpensuseLeap Version15.1
NetappActive Iq Unified Manager SwPlatformvmware_vsphere Version >= 9.5
NetappSolidfire Version-
NetappA700s Firmware Version-
   NetappA700s Version-
NetappCn1610 Firmware Version-
   NetappCn1610 Version-
NetappH610s Firmware Version-
   NetappH610s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.84% 0.877
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
secalert@redhat.com 5.9 2.2 3.6
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-122 Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

https://usn.ubuntu.com/4094-1/
Third Party Advisory
https://usn.ubuntu.com/4118-1/
Third Party Advisory
https://usn.ubuntu.com/4095-1/
Third Party Advisory
https://usn.ubuntu.com/4095-2/
Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/33
Patch
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jun/26
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4117-1/
Third Party Advisory
https://usn.ubuntu.com/4093-1/
Third Party Advisory
http://www.securityfocus.com/bid/108817
Third Party Advisory
Broken Link
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126
Patch
Third Party Advisory
Issue Tracking