8.8

CVE-2019-3846

Exploit

A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 3.0 < 3.16.70
LinuxLinux Kernel Version >= 3.17 < 4.4.186
LinuxLinux Kernel Version >= 4.5 < 4.9.186
LinuxLinux Kernel Version >= 4.10 < 4.14.134
LinuxLinux Kernel Version >= 4.15 < 4.19.59
LinuxLinux Kernel Version >= 4.20 < 5.1.18
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Version8.0
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
NetappA700s Firmware Version-
   NetappA700s Version-
NetappCn1610 Firmware Version-
   NetappCn1610 Version-
NetappH610s Firmware Version-
   NetappH610s Version-
NetappSolidfire Version-
FedoraprojectFedora Version29
FedoraprojectFedora Version30
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
OpensuseLeap Version15.0
OpensuseLeap Version15.1
OpensuseLeap Version42.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.38% 0.585
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 8.3 6.5 10
AV:A/AC:L/Au:N/C:C/I:C/A:C
secalert@redhat.com 8 2.1 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-122 Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

https://usn.ubuntu.com/4094-1/
Third Party Advisory
https://usn.ubuntu.com/4118-1/
Third Party Advisory
https://usn.ubuntu.com/4095-1/
Third Party Advisory
https://usn.ubuntu.com/4095-2/
Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/33
Patch
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jun/26
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4117-1/
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
Patch
Third Party Advisory
Issue Tracking
Mitigation
https://seclists.org/oss-sec/2019/q2/133
Third Party Advisory
Exploit
Mailing List
https://usn.ubuntu.com/4093-1/
Third Party Advisory