8.8

CVE-2019-3846

Exploit
A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 3.0 < 3.16.70
LinuxLinux Kernel Version >= 3.17 < 4.4.186
LinuxLinux Kernel Version >= 4.5 < 4.9.186
LinuxLinux Kernel Version >= 4.10 < 4.14.134
LinuxLinux Kernel Version >= 4.15 < 4.19.59
LinuxLinux Kernel Version >= 4.20 < 5.1.18
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Version8.0
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
NetappA700s Firmware Version-
   NetappA700s Version-
NetappCn1610 Firmware Version-
   NetappCn1610 Version-
NetappH610s Firmware Version-
   NetappH610s Version-
NetappSolidfire Version-
FedoraprojectFedora Version29
FedoraprojectFedora Version30
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
OpensuseLeap Version15.0
OpensuseLeap Version15.1
OpensuseLeap Version42.3
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.1% 0.781
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 8.3 6.5 10
AV:A/AC:L/Au:N/C:C/I:C/A:C
secalert@redhat.com 8 2.1 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-122 Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

https://usn.ubuntu.com/4094-1/
Third Party Advisory
https://usn.ubuntu.com/4118-1/
Third Party Advisory
https://usn.ubuntu.com/4095-1/
Third Party Advisory
https://usn.ubuntu.com/4095-2/
Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/33
Patch
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jun/26
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4117-1/
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
Patch
Third Party Advisory
Issue Tracking
Mitigation
https://seclists.org/oss-sec/2019/q2/133
Third Party Advisory
Exploit
Mailing List
https://usn.ubuntu.com/4093-1/
Third Party Advisory