CVE-2018-14625

MEDIUM

Description

A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.

References

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625

https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039

https://usn.ubuntu.com/3871-1/

https://usn.ubuntu.com/3871-3/

https://usn.ubuntu.com/3871-4/

https://usn.ubuntu.com/3871-5/

https://usn.ubuntu.com/3872-1/

https://usn.ubuntu.com/3878-1/

https://usn.ubuntu.com/3878-2/

Details

Source: MITRE

Published: 2018-09-10

Updated: 2019-03-05

Type: CWE-362

Risk Information

CVSS v2.0

Base Score: 4.4

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3.0

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1

Severity: HIGH