Vulnerability Details : CVE-2018-10932
lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.
Vulnerability category: Overflow
Products affected by CVE-2018-10932
- cpe:2.3:a:intel:lldptool:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-10932
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-10932
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:N/I:P/A:N |
6.5
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
NIST | |
4.3
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
Red Hat, Inc. |
CWE ids for CVE-2018-10932
-
The product does not neutralize or incorrectly neutralizes output that is written to logs.Assigned by: secalert@redhat.com (Primary)
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2018-10932
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10932
1614896 – (CVE-2018-10932) CVE-2018-10932 lldptool: improper sanitization of shell-escape codesIssue Tracking;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1551623
1551623 – lldptool reports unparsed OID under Management AddressIssue Tracking;Third Party Advisory
-
https://github.com/intel/openlldp/pull/7
OID Printing changes by orgcandman · Pull Request #7 · intel/openlldp · GitHubThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2019:3673
RHSA-2019:3673 - Security Advisory - Red Hat Customer Portal
Jump to