TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2018-14634

N/ACISA KEV

Beschreibung

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht9/25/2018
Zuletzt geandert1/27/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerLinux
ProduktKernel
SchwachstellennameLinux Kernel Integer Overflow Vulnerability
KEV Aufnahmedatum2026-01-26
Behebungsfrist2026-02-16
Ransomware-NutzungUnknown

Betroffene Produkte

canonical:ubuntu_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_edge_gatewayf5:big-ip_fraud_protection_servicef5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_webacceleratorf5:big-iq_centralized_managementf5:big-iq_cloud_and_orchestrationf5:enterprise_managerf5:iworkflowf5:traffix_signaling_delivery_controllerlinux:linux_kernelnetapp:snapprotectpaloaltonetworks:pan-osredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation

Schwachen (CWE)

CWE-190CWE-190

Referenzen

https://usn.ubuntu.com/3775-1/(secalert@redhat.com)
https://usn.ubuntu.com/3775-2/(secalert@redhat.com)
https://usn.ubuntu.com/3779-1/(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2021/07/20/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/105407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2748(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2763(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2846(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2924(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2925(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2933(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3540(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3586(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3590(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3591(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3643(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190204-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.paloaltonetworks.com/CVE-2018-14634(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3779-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45516/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2018/09/25/4(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.