TROYANOSYVIRUS
Voltar para CVEs

CVE-2018-14634

N/ACISA KEV

Descricao

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

Detalhes CVE

Pontuacao CVSS v3.1N/A
Publicado9/25/2018
Ultima modificacao1/27/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorLinux
ProdutoKernel
Nome da vulnerabilidadeLinux Kernel Integer Overflow Vulnerability
Data inclusao KEV2026-01-26
Prazo de remediacao2026-02-16
Uso em ransomwareUnknown

Produtos afetados

canonical:ubuntu_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_edge_gatewayf5:big-ip_fraud_protection_servicef5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_webacceleratorf5:big-iq_centralized_managementf5:big-iq_cloud_and_orchestrationf5:enterprise_managerf5:iworkflowf5:traffix_signaling_delivery_controllerlinux:linux_kernelnetapp:snapprotectpaloaltonetworks:pan-osredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation

Fraquezas (CWE)

CWE-190CWE-190

Referencias

https://usn.ubuntu.com/3775-1/(secalert@redhat.com)
https://usn.ubuntu.com/3775-2/(secalert@redhat.com)
https://usn.ubuntu.com/3779-1/(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2021/07/20/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/105407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2748(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2763(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2846(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2924(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2925(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2933(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3540(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3586(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3590(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3591(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3643(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190204-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.paloaltonetworks.com/CVE-2018-14634(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3779-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45516/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2018/09/25/4(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.