CVE Database As of 12-14-2019

CVE-2019-15098

Impact by CVSS Score
  • ID: CVE-2019-15098
Summary:

drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.

Exploitability Analysis:

This is a vulnerability exploitable with only local access requires the attacker to have either physical access to the vulnerable system or a local (shell) account. Examples of locally exploitable vulnerabilities are peripheral attacks such as Firewire/USB DMA attacks, and local privilege escalations (e.g., sudo).

Exploitability Complexity:

Specialized access conditions or extenuating circumstances do not exist. The following are examples: The affected product typically requires access to a wide range of systems and users, possibly anonymous an untrusted (e.g., Internet-facing web or mail server). The affected configuration is default or ubiquitous. The attack can be performed manually and requires little skill or additional information gathering. The 'race condition' is a lazy one (i.e., it is technically a race but easily winnable).

Authentication:

Authentication is not required to access and exploit the vulnerability.

Confidentiality Impact:

There is no impact to the confidentiality of the system.

Integrity Impact:

There is no impact to the integrity of the system.

Availability Impact:

There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.

Search
Impact
Medium
CVSS Score
4.9
Exploitable
Locally Exploitable
Created
2019-08-16 02:15:00
Modified
2019-11-25 15:15:00
Credit
NIST NVD

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage 134,461 vulnerabilities.