CVE-2014-8160

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=db29a9508a9246e77087c5531e45b2c88ec6988b

http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html

http://rhn.redhat.com/errata/RHSA-2015-0284.html

http://rhn.redhat.com/errata/RHSA-2015-0290.html

http://rhn.redhat.com/errata/RHSA-2015-0674.html

http://www.debian.org/security/2015/dsa-3170

http://www.mandriva.com/security/advisories?name=MDVSA-2015:057

http://www.mandriva.com/security/advisories?name=MDVSA-2015:058

http://www.openwall.com/lists/oss-security/2015/01/14/3

http://www.securityfocus.com/bid/72061

http://www.spinics.net/lists/netfilter-devel/msg33430.html

http://www.ubuntu.com/usn/USN-2513-1

http://www.ubuntu.com/usn/USN-2514-1

http://www.ubuntu.com/usn/USN-2515-1

http://www.ubuntu.com/usn/USN-2516-1

http://www.ubuntu.com/usn/USN-2517-1

http://www.ubuntu.com/usn/USN-2518-1

https://bugzilla.redhat.com/show_bug.cgi?id=1182059

https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b

Details

Source: MITRE

Published: 2015-03-02

Updated: 2020-05-21

Type: CWE-20

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

Tenable Plugins

View all (34 total)

IDNameProductFamilySeverity
124807EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1483)NessusHuawei Local Security Checks
high
124798EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1474)NessusHuawei Local Security Checks
high
99163OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0057) (Dirty COW)NessusOracleVM Local Security Checks
critical
83708SUSE SLES11 Security Update : kernel (SUSE-SU-2015:0652-1)NessusSuSE Local Security Checks
high
83702SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2015:0529-1)NessusSuSE Local Security Checks
high
82756openSUSE Security Update : Linux Kernel (openSUSE-2015-302)NessusSuSE Local Security Checks
critical
82755openSUSE Security Update : the Linux Kernel (openSUSE-2015-301)NessusSuSE Local Security Checks
high
82691OracleVM 3.3 : kernel-uek (OVMSA-2015-0040)NessusOracleVM Local Security Checks
high
82254Scientific Linux Security Update : kernel on SL7.x x86_64 (20150305)NessusScientific Linux Local Security Checks
high
82138Debian DLA-155-1 : linux-2.6 security updateNessusDebian Local Security Checks
critical
82020SuSE 11.3 Security Update : Linux Kernel (SAT Patch Numbers 10412 / 10415 / 10416)NessusSuSE Local Security Checks
high
81966Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2015-3012)NessusOracle Linux Local Security Checks
high
81941Mandriva Linux Security Advisory : kernel (MDVSA-2015:058)NessusMandriva Local Security Checks
high
81940Mandriva Linux Security Advisory : kernel (MDVSA-2015:057)NessusMandriva Local Security Checks
medium
81904OracleVM 3.3 : kernel-uek (OVMSA-2015-0034)NessusOracleVM Local Security Checks
high
81885CentOS 7 : kernel (CESA-2015:0290)NessusCentOS Local Security Checks
high
81873Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2015-3015)NessusOracle Linux Local Security Checks
high
81872Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2015-3014)NessusOracle Linux Local Security Checks
high
81871Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2015-3013)NessusOracle Linux Local Security Checks
high
81809Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20150311)NessusScientific Linux Local Security Checks
high
81792CentOS 6 : kernel (CESA-2015:0674)NessusCentOS Local Security Checks
high
81769RHEL 6 : kernel (RHSA-2015:0674)NessusRed Hat Local Security Checks
high
81766Oracle Linux 6 : kernel (ELSA-2015-0674)NessusOracle Linux Local Security Checks
high
81646Ubuntu 14.04 LTS : linux vulnerabilities (USN-2516-3)NessusUbuntu Local Security Checks
medium
81645Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2515-2)NessusUbuntu Local Security Checks
medium
81626RHEL 7 : kernel (RHSA-2015:0290)NessusRed Hat Local Security Checks
high
81624RHEL 6 : kernel (RHSA-2015:0284)NessusRed Hat Local Security Checks
medium
81590Ubuntu 14.04 LTS : linux vulnerability (USN-2516-2)NessusUbuntu Local Security Checks
medium
81571Ubuntu 14.10 : linux vulnerabilities (USN-2518-1)NessusUbuntu Local Security Checks
medium
81570Ubuntu 14.04 LTS : linux-lts-utopic vulnerabilities (USN-2517-1)NessusUbuntu Local Security Checks
medium
81569Ubuntu 14.04 LTS : linux vulnerabilities (USN-2516-1)NessusUbuntu Local Security Checks
medium
81568Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2515-1)NessusUbuntu Local Security Checks
medium
81567Ubuntu 12.04 LTS : linux vulnerabilities (USN-2513-1)NessusUbuntu Local Security Checks
medium
81449Debian DSA-3170-1 : linux - security updateNessusDebian Local Security Checks
critical