Oval Definition:oval:com.ubuntu.xenial:def:201814633000
Revision Date:2018-09-24Version:1
Title:CVE-2018-14633 on Ubuntu 16.04 LTS (xenial) - medium.
Description:A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. It was discovered that a stack-based buffer overflow existed in the iSCSI target implementation of the Linux kernel. A remote attacker could use this to cause a denial of service (system crash).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-14633
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • The 'linux' package in xenial was vulnerable but has been fixed (note: '4.4.0-137.163').
  • OR The 'linux-aws' package in xenial was vulnerable but has been fixed (note: '4.4.0-1069.79').
  • OR The 'linux-azure' package in xenial was vulnerable but has been fixed (note: '4.15.0-1025.26~16.04.1').
  • OR The 'linux-azure-edge' package in xenial was vulnerable but has been fixed (note: '4.15.0-1025.26').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed ESM criteria').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR The 'linux-gcp' package in xenial was vulnerable but has been fixed (note: '4.15.0-1021.22~16.04.1').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR The 'linux-hwe' package in xenial was vulnerable but has been fixed (note: '4.15.0-36.39~16.04.1').
  • OR The 'linux-hwe-edge' package in xenial was vulnerable but has been fixed (note: '4.15.0-36.39~16.04.1').
  • OR The 'linux-kvm' package in xenial was vulnerable but has been fixed (note: '4.4.0-1035.41').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR The 'linux-raspi2' package in xenial was vulnerable but has been fixed (note: '4.4.0-1098.106').
  • OR The 'linux-snapdragon' package in xenial was vulnerable but has been fixed (note: '4.4.0-1102.107').
  • BACK