Oval Definition:oval:com.ubuntu.bionic:def:2018146330000000
Revision Date:2018-09-25Version:1
Title:CVE-2018-14633 on Ubuntu 18.04 LTS (bionic) - medium.
Description:A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. It was discovered that a stack-based buffer overflow existed in the iSCSI target implementation of the Linux kernel. A remote attacker could use this to cause a denial of service (system crash).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-14633
Platform(s):Ubuntu 18.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 18.04 LTS (bionic) is installed.
  • AND Package Information
  • linux package in bionic was vulnerable but has been fixed (note: '4.15.0-36.39').
  • OR linux-aws package in bionic was vulnerable but has been fixed (note: '4.15.0-1023.23').
  • OR linux-azure package in bionic was vulnerable but has been fixed (note: '4.15.0-1025.26').
  • OR linux-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.22').
  • OR linux-kvm package in bionic was vulnerable but has been fixed (note: '4.15.0-1023.23').
  • OR linux-meta package in bionic was vulnerable but has been fixed (note: '4.15.0-36.39').
  • OR linux-meta-aws package in bionic was vulnerable but has been fixed (note: '4.15.0-1023.23').
  • OR linux-meta-azure package in bionic was vulnerable but has been fixed (note: '4.15.0-1025.26').
  • OR linux-meta-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.22').
  • OR linux-meta-kvm package in bionic was vulnerable but has been fixed (note: '4.15.0-1023.23').
  • OR linux-meta-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.24').
  • OR linux-meta-raspi2 package in bionic was vulnerable but has been fixed (note: '4.15.0-1024.26').
  • OR linux-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.24').
  • OR linux-raspi2 package in bionic was vulnerable but has been fixed (note: '4.15.0-1024.26').
  • OR linux-signed package in bionic was vulnerable but has been fixed (note: '4.15.0-36.39').
  • OR linux-signed-azure package in bionic was vulnerable but has been fixed (note: '4.15.0-1025.26').
  • OR linux-signed-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.22').
  • OR linux-signed-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.24').
  • BACK