CVE-2019-9162

In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc Mailing List Patch Vendor Advisory
http://www.securityfocus.com/bid/107159 Broken Link
https://bugs.chromium.org/p/project-zero/issues/detail?id=1776 Exploit Issue Tracking Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.25 Mailing List Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.12 Mailing List Vendor Advisory
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20190327-0002/ Third Party Advisory
https://support.f5.com/csp/article/K31864522 Third Party Advisory
https://usn.ubuntu.com/3930-1/ Third Party Advisory
https://usn.ubuntu.com/3930-2/ Third Party Advisory
https://www.exploit-db.com/exploits/46477/ Exploit Patch Third Party Advisory VDB Entry
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc Mailing List Patch Vendor Advisory
http://www.securityfocus.com/bid/107159 Broken Link
https://bugs.chromium.org/p/project-zero/issues/detail?id=1776 Exploit Issue Tracking Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.25 Mailing List Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.12 Mailing List Vendor Advisory
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20190327-0002/ Third Party Advisory
https://support.f5.com/csp/article/K31864522 Third Party Advisory
https://usn.ubuntu.com/3930-1/ Third Party Advisory
https://usn.ubuntu.com/3930-2/ Third Party Advisory
https://www.exploit-db.com/exploits/46477/ Exploit Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc - Mailing List, Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc - Mailing List, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/107159 - Broken Link () http://www.securityfocus.com/bid/107159 - Broken Link
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1776 - Issue Tracking, Exploit, Mailing List, Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1776 - Exploit, Issue Tracking, Mailing List, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.25 - Mailing List, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.25 - Mailing List, Vendor Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.12 - Mailing List, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.12 - Mailing List, Vendor Advisory
References () https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc - Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190327-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190327-0002/ - Third Party Advisory
References () https://support.f5.com/csp/article/K31864522 - Third Party Advisory () https://support.f5.com/csp/article/K31864522 - Third Party Advisory
References () https://usn.ubuntu.com/3930-1/ - Third Party Advisory () https://usn.ubuntu.com/3930-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3930-2/ - Third Party Advisory () https://usn.ubuntu.com/3930-2/ - Third Party Advisory
References () https://www.exploit-db.com/exploits/46477/ - Exploit, Patch, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46477/ - Exploit, Patch, Third Party Advisory, VDB Entry

Information

Published : 2019-02-25 23:29

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9162

Mitre link : CVE-2019-9162

CVE.ORG link : CVE-2019-9162


JSON object : View

Products Affected

netapp

  • cn1610_firmware
  • hci_management_node
  • snapprotect
  • solidfire
  • cn1610

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write