CVE-2018-1065

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8

http://lists.openwall.net/netdev/2018/01/27/46

http://patchwork.ozlabs.org/patch/870355/

http://www.securitytracker.com/id/1040446

https://access.redhat.com/errata/RHSA-2018:2948

https://bugzilla.redhat.com/show_bug.cgi?id=1547824

https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8

https://usn.ubuntu.com/3654-1/

https://usn.ubuntu.com/3654-2/

https://usn.ubuntu.com/3656-1/

https://www.debian.org/security/2018/dsa-4188

Details

Source: MITRE

Published: 2018-03-02

Updated: 2018-10-31

Type: CWE-476

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.15.7 (inclusive)

Tenable Plugins

View all (11 total)

IDNameProductFamilySeverity
124975EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1522)NessusHuawei Local Security Checks
high
118513RHEL 7 : kernel-alt (RHSA-2018:2948) (Spectre)NessusRed Hat Local Security Checks
high
118272SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1855-2)NessusSuSE Local Security Checks
high
110838SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1855-1)NessusSuSE Local Security Checks
high
110104openSUSE Security Update : the Linux Kernel (openSUSE-2018-514) (Spectre)NessusSuSE Local Security Checks
high
110051Ubuntu 16.04 LTS : Linux kernel (Raspberry Pi 2, Snapdragon) vulnerabilities (USN-3656-1)NessusUbuntu Local Security Checks
high
110049Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3654-2) (Spectre)NessusUbuntu Local Security Checks
high
110048Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3654-1) (Spectre)NessusUbuntu Local Security Checks
high
110033SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:1366-1) (Spectre)NessusSuSE Local Security Checks
high
109518Debian DSA-4188-1 : linux - security update (Spectre)NessusDebian Local Security Checks
high
108307Fedora 27 : kernel (2018-2bce10900e)NessusFedora Local Security Checks
critical