TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-14816

HIGH
7.8

Beschreibung

There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.

CVE Details

CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht9/20/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoralinux:linux_kernelnetapp:a220netapp:a220_firmwarenetapp:a320netapp:a320_firmwarenetapp:a700snetapp:a700s_firmwarenetapp:a800netapp:a800_firmwarenetapp:c190netapp:c190_firmwarenetapp:data_availability_servicesnetapp:fas2720netapp:fas2720_firmwarenetapp:fas2750netapp:fas2750_firmwarenetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_management_nodenetapp:service_processornetapp:solidfirenetapp:steelstore_cloud_integrated_storageopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_compute_node_eusredhat:enterprise_linux_eusredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_tusredhat:messaging_realtime_gridredhat:virtualization

Schwachen (CWE)

CWE-122CWE-787

Referenzen

https://usn.ubuntu.com/4157-1/(secalert@redhat.com)
https://usn.ubuntu.com/4157-2/(secalert@redhat.com)
https://usn.ubuntu.com/4162-1/(secalert@redhat.com)
https://usn.ubuntu.com/4162-2/(secalert@redhat.com)
https://usn.ubuntu.com/4163-1/(secalert@redhat.com)
https://usn.ubuntu.com/4163-2/(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/08/28/1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0174(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0204(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0328(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0339(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0374(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0375(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0653(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0661(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0664(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/cve-2019-14816(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Nov/11(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4157-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4157-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4162-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4162-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4163-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4163-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2019/08/28/1(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.