Lucene search

K
nvd[email protected]NVD:CVE-2019-14835
HistorySep 17, 2019 - 4:15 p.m.

CVE-2019-14835

2019-09-1716:15:10
CWE-120
web.nvd.nist.gov
1

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.6%

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel’s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.343.16.74
OR
linuxlinux_kernelRange4.44.4.193
OR
linuxlinux_kernelRange4.94.9.193
OR
linuxlinux_kernelRange4.144.14.144
OR
linuxlinux_kernelRange4.194.19.73
OR
linuxlinux_kernelRange5.25.2.15
OR
linuxlinux_kernelMatch5.3
Node
canonicalubuntu_linuxMatch12.04-
OR
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch16.04esm
OR
canonicalubuntu_linuxMatch18.04lts
OR
canonicalubuntu_linuxMatch19.04
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
fedoraprojectfedoraMatch29
OR
fedoraprojectfedoraMatch30
Node
opensuseleapMatch15.0
OR
opensuseleapMatch15.1
Node
netappaff_a700s
AND
netappaff_a700s_firmwareMatch-
Node
netapph410c
AND
netapph410c_firmwareMatch-
Node
netapph610s
AND
netapph610s_firmwareMatch-
Node
netapph300s
AND
netapph300s_firmwareMatch-
Node
netapph500s
AND
netapph500s_firmwareMatch-
Node
netapph700s
AND
netapph700s_firmwareMatch-
Node
netapph300e_firmwareMatch-
AND
netapph300e
Node
netapph500e_firmwareMatch-
AND
netapph500e
Node
netapph700e_firmwareMatch-
AND
netapph700e
Node
netapph410s_firmwareMatch-
AND
netapph410s
Node
netappdata_availability_servicesMatch-
OR
netapphci_management_nodeMatch-
OR
netappservice_processorMatch-
OR
netappsolidfireMatch-
OR
netappsteelstore_cloud_integrated_storageMatch-
Node
redhatopenshift_container_platformMatch3.11
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_eusMatch7.5
OR
redhatenterprise_linux_eusMatch7.6
OR
redhatenterprise_linux_eusMatch7.7
OR
redhatenterprise_linux_for_real_timeMatch7
OR
redhatenterprise_linux_for_real_timeMatch8
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_serverMatch7.6
OR
redhatenterprise_linux_server_ausMatch6.5
OR
redhatenterprise_linux_server_ausMatch6.6
OR
redhatenterprise_linux_server_ausMatch7.2
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_ausMatch7.7
OR
redhatenterprise_linux_server_tusMatch7.2
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.4
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.7
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
redhatvirtualizationMatch4.0
OR
redhatvirtualization_hostMatch4.0
AND
redhatenterprise_linuxMatch7.0
Node
huaweiimanager_netecoMatchv600r009c00
OR
huaweiimanager_netecoMatchv600r009c10spc200
OR
huaweiimanager_neteco_6000Matchv600r008c10spc300
OR
huaweiimanager_neteco_6000Matchv600r008c20
OR
huaweimanageoneMatch6.5.0
OR
huaweimanageoneMatch6.5.0.spc100.b210
OR
huaweimanageoneMatch6.5.1rc1.b060
OR
huaweimanageoneMatch6.5.1rc1.b080
OR
huaweimanageoneMatch6.5.rc2.b050

References

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.6%