Количество 36
Количество 36

CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in ...

SUSE-SU-2018:3867-1
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3)

SUSE-SU-2018:3268-1
Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3)
GHSA-88p5-45fx-5x87
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

BDU:2019-01738
Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации

SUSE-SU-2018:3789-1
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2)

SUSE-SU-2018:3470-1
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)

SUSE-SU-2018:3331-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15)

SUSE-SU-2018:3328-1
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)

SUSE-SU-2018:3272-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15)

SUSE-SU-2018:3265-1
Security update for the Linux Kernel (Live Patch 38 for SLE 12)

SUSE-SU-2018:3173-1
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)

SUSE-SU-2018:3164-1
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP3)

SUSE-SU-2018:3159-1
Security update for the Linux Kernel

SUSE-SU-2018:3158-1
Security update for the Linux Kernel
ELSA-2018-3651
ELSA-2018-3651: kernel security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2018:3238-1
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
![]() | CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
![]() | CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in ... | CVSS3: 7 | 9% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3867-1 Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) | 9% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3268-1 Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3) | 9% Низкий | больше 6 лет назад | |
GHSA-88p5-45fx-5x87 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | около 3 лет назад | |
![]() | BDU:2019-01738 Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
![]() | SUSE-SU-2018:3789-1 Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3470-1 Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3331-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3328-1 Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3272-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3265-1 Security update for the Linux Kernel (Live Patch 38 for SLE 12) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3173-1 Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3164-1 Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP3) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3159-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3158-1 Security update for the Linux Kernel | больше 6 лет назад | ||
ELSA-2018-3651 ELSA-2018-3651: kernel security, bug fix, and enhancement update (MODERATE) | больше 6 лет назад | |||
![]() | SUSE-SU-2018:3238-1 Security update for the Linux Kernel (Live Patch 29 for SLE 12) | больше 6 лет назад |
Уязвимостей на страницу