ID

VAR-201805-0950


CVE

CVE-2018-8897


TITLE

Hardware debug exception documentation may result in unexpected behavior

Trust: 0.8

sources: CERT/CC: VU#631579

DESCRIPTION

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs. Some operating systems and hypervisors Intel There is a problem that does not expect a debug exception in the hardware architecture, or does not handle it properly. Inappropriate checking or handling for exceptional situations (CWE-703) - CVE-2018-8897 Intel Software Developer Manual (SDM) Vol. SDM Vol 3A section 2.3 According to the debug exception EFLAGS Register IF flag (Interrupt Enable Flag) Is not prohibited. So in certain situations, certain Intel x86-64 Ring level after using architecture-specific instructions 3 Running on OS From component , Higher ring level ( many OS In the ring level 0) Debug exceptions pointing to the data in are enabled. This allows the attacker to API May be used to access sensitive memory information or manipulate high privileged operating system functions.An authenticated attacker could obtain sensitive data in memory and manipulate higher privileged operating system functions. Microsoft Windows is prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code with elevated privileges. Intel Architecture (processor architecture) is a CPU specification developed by Intel Corporation for its processor. There are security vulnerabilities in the operating systems of multiple vendors. Systems from the following vendors are affected: Apple; DragonFly BSD Project; FreeBSD Project; Linux Kernel; Microsoft; Red Hat; SUSE Linux; Ubuntu; Vmware; Xen. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:1319-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1319 Issue date: 2018-05-08 CVE Names: CVE-2017-7645 CVE-2017-8824 CVE-2017-13166 CVE-2017-18017 CVE-2017-1000410 CVE-2018-8897 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * hw: cpu: speculative execution permission faults handling (CVE-2017-5754) * Kernel: error in exception handling leads to DoS (CVE-2018-8897) * kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017) * kernel: Stack information leak in the EFS element (CVE-2017-1000410) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410. Bug Fix(es): These updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1443615 - CVE-2017-7645 kernel: nfsd: Incorrect handling of long RPC replies 1519160 - CVE-2017-1000410 kernel: Stack information leak in the EFS element 1519591 - CVE-2017-8824 kernel: Use-after-free vulnerability in DCCP socket 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling 1531135 - CVE-2017-18017 kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c 1548412 - CVE-2017-13166 kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation 1567074 - CVE-2018-8897 Kernel: error in exception handling leads to DoS 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-696.28.1.el6.src.rpm i386: kernel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-devel-2.6.32-696.28.1.el6.i686.rpm kernel-headers-2.6.32-696.28.1.el6.i686.rpm perf-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpm kernel-doc-2.6.32-696.28.1.el6.noarch.rpm kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm x86_64: kernel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-headers-2.6.32-696.28.1.el6.x86_64.rpm perf-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-696.28.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpm kernel-doc-2.6.32-696.28.1.el6.noarch.rpm kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm x86_64: kernel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-headers-2.6.32-696.28.1.el6.x86_64.rpm perf-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-696.28.1.el6.src.rpm i386: kernel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-devel-2.6.32-696.28.1.el6.i686.rpm kernel-headers-2.6.32-696.28.1.el6.i686.rpm perf-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpm kernel-doc-2.6.32-696.28.1.el6.noarch.rpm kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm ppc64: kernel-2.6.32-696.28.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-696.28.1.el6.ppc64.rpm kernel-debug-2.6.32-696.28.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-696.28.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-696.28.1.el6.ppc64.rpm kernel-devel-2.6.32-696.28.1.el6.ppc64.rpm kernel-headers-2.6.32-696.28.1.el6.ppc64.rpm perf-2.6.32-696.28.1.el6.ppc64.rpm perf-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm s390x: kernel-2.6.32-696.28.1.el6.s390x.rpm kernel-debug-2.6.32-696.28.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.s390x.rpm kernel-debug-devel-2.6.32-696.28.1.el6.s390x.rpm kernel-debuginfo-2.6.32-696.28.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-696.28.1.el6.s390x.rpm kernel-devel-2.6.32-696.28.1.el6.s390x.rpm kernel-headers-2.6.32-696.28.1.el6.s390x.rpm kernel-kdump-2.6.32-696.28.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-696.28.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-696.28.1.el6.s390x.rpm perf-2.6.32-696.28.1.el6.s390x.rpm perf-debuginfo-2.6.32-696.28.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.s390x.rpm x86_64: kernel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-headers-2.6.32-696.28.1.el6.x86_64.rpm perf-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-696.28.1.el6.ppc64.rpm perf-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm python-perf-2.6.32-696.28.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-696.28.1.el6.s390x.rpm kernel-debuginfo-2.6.32-696.28.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-696.28.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-696.28.1.el6.s390x.rpm perf-debuginfo-2.6.32-696.28.1.el6.s390x.rpm python-perf-2.6.32-696.28.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-696.28.1.el6.src.rpm i386: kernel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-devel-2.6.32-696.28.1.el6.i686.rpm kernel-headers-2.6.32-696.28.1.el6.i686.rpm perf-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpm kernel-doc-2.6.32-696.28.1.el6.noarch.rpm kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm x86_64: kernel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm kernel-headers-2.6.32-696.28.1.el6.x86_64.rpm perf-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-2.6.32-696.28.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.28.1.el6.i686.rpm perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm python-perf-2.6.32-696.28.1.el6.i686.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.28.1.el6.x86_64.rpm perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm python-perf-2.6.32-696.28.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.28.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-7645 https://access.redhat.com/security/cve/CVE-2017-8824 https://access.redhat.com/security/cve/CVE-2017-13166 https://access.redhat.com/security/cve/CVE-2017-18017 https://access.redhat.com/security/cve/CVE-2017-1000410 https://access.redhat.com/security/cve/CVE-2018-8897 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/3431591 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFa8fO8XlSAg2UNWIIRAnN0AKCBdjdw1bC12xju0GwoOedA1L8osACaA1Ze 4IKrbiFeHd+C9bqCjUFX4pw= =3psi -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. (BZ#1549768) 4. CVE-2018-10471 An error was discovered in the mitigations against Meltdown which could result in denial of service. CVE-2018-10472 Anthony Perard discovered that incorrect parsing of CDROM images can result in information disclosure. CVE-2018-10981 Jan Beulich discovered that malformed device models could result in denial of service. CVE-2018-10982 Roger Pau Monne discovered that incorrect handling of high precision event timers could result in denial of service and potentially privilege escalation. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2018-05-08-1 Additional information for APPLE-SA-2018-04-24-2 Security Update 2018-001 Security Update 2018-001 addresses the following: Crash Reporter Available for: macOS High Sierra 10.13.4 Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved error handling. The issue appears to be from an undocumented side effect of the instructions. CVE-2018-8897: Andy Lutomirski, Nick Peterson (linkedin.com/in/everdox) of Everdox Tech LLC Entry added May 8, 2018 LinkPresentation Available for: macOS High Sierra 10.13.4 Impact: Processing a maliciously crafted text message may lead to UI spoofing Description: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-18:06.debugreg Security Advisory The FreeBSD Project Topic: Mishandling of x86 debug exceptions Category: core Module: kernel Announced: 2018-05-08 Credits: Nick Peterson, Everdox Tech LLC https://www.linkedin.com/in/everdox Andy Lutomirski Affects: All supported versions of FreeBSD. Corrected: 2018-05-08 17:03:33 UTC (stable/11, 11.2-PRERELEASE) 2018-05-08 17:12:10 UTC (releng/11.1, 11.1-RELEASE-p10) 2018-05-08 17:05:39 UTC (stable/10, 10.4-STABLE) 2018-05-08 17:12:10 UTC (releng/10.4, 10.4-RELEASE-p9) CVE Name: CVE-2018-8897 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. Background On x86 architecture systems, the stack is represented by the combination of a stack segment and a stack pointer, which must remain in sync for proper operation. Instructions related to manipulating the stack segment have special handling to facilitate consistency with changes to the stack pointer. II. If that instruction is a system call or similar instruction that transfers control to the operating system, the debug exception will be handled in the kernel context instead of the user context. III. IV. Workaround No workaround is available. V. Solution Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, using either a binary or source code patch, and then reboot. 1) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install And reboot. 2) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 11.1] # fetch https://security.FreeBSD.org/patches/SA-18:06/debugreg.11.1.patch # fetch https://security.FreeBSD.org/patches/SA-18:06/debugreg.11.1.patch.asc # gpg --verify debugreg.11.1.patch.asc [FreeBSD 10.4] # fetch https://security.FreeBSD.org/patches/SA-18:06/debugreg.10.4.patch # fetch https://security.FreeBSD.org/patches/SA-18:06/debugreg.10.4.patch.asc # gpg --verify debugreg.10.4.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile and install your kernel as described in <URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r333370 releng/10.4/ r333371 stable/11/ r333369 releng/11.1/ r333371 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. Bug Fix(es): * The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554253) 4. 6.5) - x86_64 3. (BZ#1554256) 4. CVE-2018-1087 Andy Lutomirski discovered that the KVM implementation did not properly handle #DB exceptions while deferred by MOV SS/POP SS, allowing an unprivileged KVM guest user to crash the guest or potentially escalate their privileges. CVE-2018-8897 Nick Peterson of Everdox Tech LLC discovered that #DB exceptions that are deferred by MOV SS or POP SS are not properly handled, allowing an unprivileged user to crash the kernel and cause a denial of service. For the oldstable distribution (jessie), these problems have been fixed in version 3.16.56-1+deb8u1. This update includes various fixes for regressions from 3.16.56-1 as released in DSA-4187-1 (Cf. For the stable distribution (stretch), these problems have been fixed in version 4.9.88-1+deb9u1. The fix for CVE-2018-1108 applied in DSA-4188-1 is temporarily reverted due to various regression, cf. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlryHFFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SMQA/9HoJDt2OdyqqtfNUuWfP3sgGV1QVjIJnF39unKRdIaGw9m0RHQUu1G3rC cgxcYcpQ0h10Yy5KVh4APqt55K7aVWVQT6xB0yx2VddMEwwl3rp2r/eL7EtoOkQT zZW5JponzlEAjC9uGk7CouA7z/qFtd5awufFhAjMF5eL4ZQ6pG8wWEbae6DbU9nz c7F+okC4hL6yPuWVEWzTRUFK1W0hs2N+VQgHV/afZaMAAooeZJDJeq1Hn/PVYvwJ IHSOs01+kn0OUFHkVRA7kVdFAYUJlfhsDcXd9nB/lkxhc/HNI1g/dK76mRxjsiMo pJlkPbEmZlOtmNG7vogxEp72ab24j2CITIHiID7ftZH5R/I2CSxp2dIzRVKdmP6P tsfh/KcpUMNwwiPiGed1DMCjtsHOodBOkLtVsoHHJVMZg2xqfCrlqNRUn9o+0DcR gO7HBsWG9K1qvSBWuRtQLT8QP00P3dSdhHmfWyfN8eJxTot+WJuMF/o+jbF6GGrZ lPmzWqg4oL7jvQO8nlEkatjIFejEg0jmt+rCXyEbK8Uc9xjJk35GKIZne5X09BFe 36zY7HbMlPvLP/VHSb6fcPBpQo/HuG0/htAB1HpWS1fPrth1J76g2EmwFSG5Lo51 IRxTXP4UZuOL1sJHQ80220tThKs2dk1Yy77dKk8qQiQ2nC2JgNs= =CskH -----END PGP SIGNATURE-----

Trust: 3.69

sources: NVD: CVE-2018-8897 // CERT/CC: VU#631579 // JVNDB: JVNDB-2018-003031 // BID: 104071 // VULHUB: VHN-138929 // PACKETSTORM: 147550 // PACKETSTORM: 147535 // PACKETSTORM: 147545 // PACKETSTORM: 147548 // PACKETSTORM: 147651 // PACKETSTORM: 147533 // PACKETSTORM: 147536 // PACKETSTORM: 147539 // PACKETSTORM: 147546 // PACKETSTORM: 147542 // PACKETSTORM: 147551

AFFECTED PRODUCTS

vendor:ubuntumodel: - scope: - version: -

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.6

vendor:citrixmodel:xenserverscope:eqversion:7.4

Trust: 1.0

vendor:freebsdmodel:freebsdscope:gteversion:11.0

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:6.1

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:6.0.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.10

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.13.4

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:xenmodel:xenscope:eqversion: -

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:7.3

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:5.2

Trust: 1.0

vendor:freebsdmodel:freebsdscope:ltversion:11.1

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:7.1

Trust: 1.0

vendor:synologymodel:skynasscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:6.2.0

Trust: 1.0

vendor:redhatmodel:enterprise virtualization managerscope:eqversion:3.0

Trust: 1.0

vendor:citrixmodel:xenserverscope:eqversion:7.2

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:dragonfly bsdmodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:linux kernelmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:xenmodel: - scope: - version: -

Trust: 0.8

vendor:multiple vendorsmodel: - scope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope:neversion:4.14.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.8

Trust: 0.3

vendor:freebsdmodel:11.1-release-p9scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.28

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:20120

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:6.7

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:10.4-release-p8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.7

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-6.7

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.5

Trust: 0.3

vendor:freebsdmodel:11.1-release-p4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:synologymodel:dsmscope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1018030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.10

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:18030

Trust: 0.3

vendor:linuxmodel:kernel 4.10-rc8scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.105

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.4.125

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.11

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:8.10

Trust: 0.3

vendor:microsoftmodel:windows rtscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows server r2 for itanium-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.1

Trust: 0.3

vendor:freebsdmodel:11.1-release-p7scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.3.0

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:8.10

Trust: 0.3

vendor:freebsdmodel:11.2-prereleasescope:neversion: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.78

Trust: 0.3

vendor:freebsdmodel:10.4-release-p6scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.2

Trust: 0.3

vendor:synologymodel:virtual dsmscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.82

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:enterprise linux extended update supportscope:eqversion:7.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.1

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.2

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.22

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.3.1

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13

Trust: 0.3

vendor:redhatmodel:enterprise linux long life 5.9.serverscope: - version: -

Trust: 0.3

vendor:synologymodel:dsmscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.9.91

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.6

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.3.1

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:100

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.8

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:17.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.15

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.0-28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.13

Trust: 0.3

vendor:linuxmodel:kernel 4.10-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.4

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20160

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.4

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:11.2

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.1

Trust: 0.3

vendor:freebsdmodel:10.4-release-p3scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux esmscope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.11

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.11

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.15.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.3

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:10.4-release-p9scope:neversion: -

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.14

Trust: 0.3

vendor:linuxmodel:kernel 4.12-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14

Trust: 0.3

vendor:redhatmodel:mrg realtime for rhel serverscope:eqversion:62

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.3

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1016070

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.4

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.9

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.68

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.7

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20120

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.74

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.14

Trust: 0.3

vendor:synologymodel:skynasscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4.1

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.1

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017090

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.7

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.7

Trust: 0.3

vendor:applemodel:macos security updatescope:neversion:2018

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:17090

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:100

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.8

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1016070

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:11.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.1

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1018030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.71

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.4

Trust: 0.3

vendor:freebsdmodel:11.1-release-p10scope:neversion: -

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.1

Trust: 0.3

vendor:freebsdmodel:10.4-stablescope:neversion: -

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017030

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017090

Trust: 0.3

sources: CERT/CC: VU#631579 // BID: 104071 // JVNDB: JVNDB-2018-003031 // CNNVD: CNNVD-201805-208 // NVD: CVE-2018-8897

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-8897
value: HIGH

Trust: 1.0

NVD: CVE-2018-8897
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201805-208
value: HIGH

Trust: 0.6

VULHUB: VHN-138929
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-8897
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2018-8897
severity: MEDIUM
baseScore: 6.8
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-138929
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-8897
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CERT/CC: VU#631579 // VULHUB: VHN-138929 // CNNVD: CNNVD-201805-208 // NVD: CVE-2018-8897

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:CWE-264

Trust: 0.1

sources: VULHUB: VHN-138929 // NVD: CVE-2018-8897

THREAT TYPE

local

Trust: 1.0

sources: BID: 104071 // PACKETSTORM: 147536 // CNNVD: CNNVD-201805-208

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201805-208

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003031

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#631579 // VULHUB: VHN-138929

PATCH

title:Intel 64 and IA-32 Architectures Software Developer Manualsurl:https://software.intel.com/en-us/articles/intel-sdm

Trust: 0.8

title:NV18-013url:https://jpn.nec.com/security-info/secinfo/nv18-013.html

Trust: 0.8

title:Repair measures for operating system security vulnerabilities of multiple vendorsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79892

Trust: 0.6

sources: JVNDB: JVNDB-2018-003031 // CNNVD: CNNVD-201805-208

EXTERNAL IDS

db:NVDid:CVE-2018-8897

Trust: 3.9

db:CERT/CCid:VU#631579

Trust: 3.6

db:BIDid:104071

Trust: 2.0

db:OPENWALLid:OSS-SECURITY/2018/05/08/4

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2018/05/08/1

Trust: 1.7

db:SECTRACKid:1040849

Trust: 1.7

db:SECTRACKid:1040882

Trust: 1.7

db:SECTRACKid:1040744

Trust: 1.7

db:SECTRACKid:1040866

Trust: 1.7

db:SECTRACKid:1040861

Trust: 1.7

db:EXPLOIT-DBid:44697

Trust: 1.7

db:EXPLOIT-DBid:45024

Trust: 1.7

db:JVNid:JVNVU98401336

Trust: 0.8

db:JVNDBid:JVNDB-2018-003031

Trust: 0.8

db:AUSCERTid:ESB-2019.1089

Trust: 0.6

db:AUSCERTid:ESB-2019.0544

Trust: 0.6

db:CNNVDid:CNNVD-201805-208

Trust: 0.6

db:PACKETSTORMid:147542

Trust: 0.2

db:PACKETSTORMid:147550

Trust: 0.2

db:PACKETSTORMid:147539

Trust: 0.2

db:PACKETSTORMid:147536

Trust: 0.2

db:PACKETSTORMid:147548

Trust: 0.2

db:PACKETSTORMid:147541

Trust: 0.1

db:PACKETSTORMid:148549

Trust: 0.1

db:PACKETSTORMid:147543

Trust: 0.1

db:VULHUBid:VHN-138929

Trust: 0.1

db:PACKETSTORMid:147535

Trust: 0.1

db:PACKETSTORMid:147545

Trust: 0.1

db:PACKETSTORMid:147651

Trust: 0.1

db:PACKETSTORMid:147533

Trust: 0.1

db:PACKETSTORMid:147546

Trust: 0.1

db:PACKETSTORMid:147551

Trust: 0.1

sources: CERT/CC: VU#631579 // VULHUB: VHN-138929 // BID: 104071 // PACKETSTORM: 147550 // PACKETSTORM: 147535 // PACKETSTORM: 147545 // PACKETSTORM: 147548 // PACKETSTORM: 147651 // PACKETSTORM: 147533 // PACKETSTORM: 147536 // PACKETSTORM: 147539 // PACKETSTORM: 147546 // PACKETSTORM: 147542 // PACKETSTORM: 147551 // JVNDB: JVNDB-2018-003031 // CNNVD: CNNVD-201805-208 // NVD: CVE-2018-8897

REFERENCES

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8897

Trust: 2.8

url:https://www.kb.cert.org/vuls/id/631579

Trust: 2.8

url:https://xenbits.xen.org/xsa/advisory-260.html

Trust: 2.5

url:https://bugzilla.redhat.com/show_bug.cgi?id=1567074

Trust: 2.0

url:https://www.freebsd.org/security/advisories/freebsd-sa-18:06.debugreg.asc

Trust: 2.0

url:https://usn.ubuntu.com/3641-1/

Trust: 2.0

url:https://usn.ubuntu.com/3641-2/

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-8897

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:1319

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1346

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1350

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1352

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1353

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1354

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1355

Trust: 1.8

url:http://www.securityfocus.com/bid/104071

Trust: 1.7

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en

Trust: 1.7

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20180927-0002/

Trust: 1.7

url:https://support.citrix.com/article/ctx234679

Trust: 1.7

url:https://www.synology.com/support/security/synology_sa_18_21

Trust: 1.7

url:https://www.debian.org/security/2018/dsa-4196

Trust: 1.7

url:https://www.debian.org/security/2018/dsa-4201

Trust: 1.7

url:https://www.exploit-db.com/exploits/44697/

Trust: 1.7

url:https://www.exploit-db.com/exploits/45024/

Trust: 1.7

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9

Trust: 1.7

url:http://openwall.com/lists/oss-security/2018/05/08/1

Trust: 1.7

url:http://openwall.com/lists/oss-security/2018/05/08/4

Trust: 1.7

url:https://github.com/can1357/cve-2018-8897/

Trust: 1.7

url:https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9

Trust: 1.7

url:https://patchwork.kernel.org/patch/10386677/

Trust: 1.7

url:https://support.apple.com/ht208742

Trust: 1.7

url:https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1318

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1345

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1347

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1348

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1349

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1351

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1524

Trust: 1.7

url:http://www.securitytracker.com/id/1040744

Trust: 1.7

url:http://www.securitytracker.com/id/1040849

Trust: 1.7

url:http://www.securitytracker.com/id/1040861

Trust: 1.7

url:http://www.securitytracker.com/id/1040866

Trust: 1.7

url:http://www.securitytracker.com/id/1040882

Trust: 1.7

url:https://access.redhat.com/security/vulnerabilities/pop_ss

Trust: 1.6

url:https://svnweb.freebsd.org/base?view=revision&revision=333368

Trust: 1.6

url:https://kb.vmware.com/s/article/54988

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2018-8897

Trust: 1.0

url:https://everdox.net/popss.pdf

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/703.html

Trust: 0.8

url:https://support.apple.com/en-us/ht208742

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk126534

Trust: 0.8

url:https://security.freebsd.org/advisories/freebsd-sa-18:06.debugreg.asc

Trust: 0.8

url:https://usn.ubuntu.com/3641-1/https://usn.ubuntu.com/3641-2/

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8897

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98401336/index.html

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/security/team/key/

Trust: 0.7

url:https://access.redhat.com/articles/11258

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:http://www.ibm.com/support/docview.wss?uid=ibm10872142

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75922

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10879093

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10872142

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190921-01-debug-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78218

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:http://www.microsoft.com

Trust: 0.3

url:https://support.apple.com/en-ie/ht208742

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2018/may/msg00001.html

Trust: 0.3

url:https://www.synology.com/en-global/support/security/synology_sa_18_21

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-1087

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000199

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-1000199

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://svnweb.freebsd.org/base?view=revision&amp;revision=333368

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13166

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-7645

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-8824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7645

Trust: 0.1

url:https://access.redhat.com/articles/3431591

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18017

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-13166

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-1000410

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000410

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16939

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1087

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-16939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10471

Trust: 0.1

url:https://security-tracker.debian.org/tracker/xen

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10982

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4206

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4187

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8897>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:06/debugreg.10.4.patch

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:06/debugreg.11.1.patch

Trust: 0.1

url:https://www.freebsd.org/handbook/kernelconfig.html>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:06/debugreg.11.1.patch.asc

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-18:06.debugreg.asc>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:06/debugreg.10.4.patch.asc

Trust: 0.1

url:https://www.linkedin.com/in/everdox

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5754

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

sources: CERT/CC: VU#631579 // VULHUB: VHN-138929 // BID: 104071 // PACKETSTORM: 147550 // PACKETSTORM: 147535 // PACKETSTORM: 147545 // PACKETSTORM: 147548 // PACKETSTORM: 147651 // PACKETSTORM: 147533 // PACKETSTORM: 147536 // PACKETSTORM: 147539 // PACKETSTORM: 147546 // PACKETSTORM: 147542 // PACKETSTORM: 147551 // JVNDB: JVNDB-2018-003031 // CNNVD: CNNVD-201805-208 // NVD: CVE-2018-8897

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 147550 // PACKETSTORM: 147535 // PACKETSTORM: 147545 // PACKETSTORM: 147548 // PACKETSTORM: 147539 // PACKETSTORM: 147546 // PACKETSTORM: 147542

SOURCES

db:CERT/CCid:VU#631579
db:VULHUBid:VHN-138929
db:BIDid:104071
db:PACKETSTORMid:147550
db:PACKETSTORMid:147535
db:PACKETSTORMid:147545
db:PACKETSTORMid:147548
db:PACKETSTORMid:147651
db:PACKETSTORMid:147533
db:PACKETSTORMid:147536
db:PACKETSTORMid:147539
db:PACKETSTORMid:147546
db:PACKETSTORMid:147542
db:PACKETSTORMid:147551
db:JVNDBid:JVNDB-2018-003031
db:CNNVDid:CNNVD-201805-208
db:NVDid:CVE-2018-8897

LAST UPDATE DATE

2025-07-10T22:09:42.555000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#631579date:2019-07-11T00:00:00
db:VULHUBid:VHN-138929date:2019-10-03T00:00:00
db:BIDid:104071date:2018-05-17T06:00:00
db:JVNDBid:JVNDB-2018-003031date:2018-07-31T00:00:00
db:CNNVDid:CNNVD-201805-208date:2022-03-10T00:00:00
db:NVDid:CVE-2018-8897date:2024-11-21T04:14:33.140

SOURCES RELEASE DATE

db:CERT/CCid:VU#631579date:2018-05-08T00:00:00
db:VULHUBid:VHN-138929date:2018-05-08T00:00:00
db:BIDid:104071date:2018-05-08T00:00:00
db:PACKETSTORMid:147550date:2018-05-08T23:57:37
db:PACKETSTORMid:147535date:2018-05-08T20:33:37
db:PACKETSTORMid:147545date:2018-05-08T23:55:04
db:PACKETSTORMid:147548date:2018-05-08T23:56:36
db:PACKETSTORMid:147651date:2018-05-16T07:54:27
db:PACKETSTORMid:147533date:2018-05-08T20:32:15
db:PACKETSTORMid:147536date:2018-05-08T20:33:55
db:PACKETSTORMid:147539date:2018-05-08T23:52:05
db:PACKETSTORMid:147546date:2018-05-08T23:55:56
db:PACKETSTORMid:147542date:2018-05-08T23:54:00
db:PACKETSTORMid:147551date:2018-05-09T17:44:05
db:JVNDBid:JVNDB-2018-003031date:2018-05-10T00:00:00
db:CNNVDid:CNNVD-201805-208date:2018-05-09T00:00:00
db:NVDid:CVE-2018-8897date:2018-05-08T18:29:00.547