CVE-2018-14633 Details

CVE-2018-14633

Published: 2018-09-25
Last Modified: 2018-11-27
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.3/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 8.5/10
Confidentiality Impact Partial
Availability Impact Complete
Integrity Impact Partial
Vector String AV:N/AC:M/Au:N/C:P/I:P/A:C
Common Vulnerability Score System v3.1
Severity High
Base Score 7/10
Exploit Score 2.2/10
Access Vector Network
Access Complexity High
Privileges Required None
Impact Score 4.7/10
Confidentiality Impact Low
Availability Impact High
Integrity Impact Low
Scope Unchanged
User Interaction None
Vector String CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* Yes 3.10 -
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* Yes 4.14 -
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* Yes 4.18 -
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* Yes - -
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* Yes - -
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* Yes - -
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* Yes - -
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* Yes - -
References

http://www.securityfocus.com/bid/105388
https://access.redhat.com/errata/RHSA-2018:3651
https://access.redhat.com/errata/RHSA-2018:3666
https://access.redhat.com/errata/RHSA-2019:1946
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://seclists.org/oss-sec/2018/q3/270
https://usn.ubuntu.com/3775-1/
https://usn.ubuntu.com/3775-2/
https://usn.ubuntu.com/3776-1/
https://usn.ubuntu.com/3776-2/
https://usn.ubuntu.com/3777-1/
https://usn.ubuntu.com/3777-2/
https://usn.ubuntu.com/3777-3/
https://usn.ubuntu.com/3779-1/
https://www.debian.org/security/2018/dsa-4308

CVE ID
CVE-2018-14633
Published
2018-09-25
Modified
2018-11-27
CVSSv2.0
High
CVSSv3.1
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-119

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.