Vulnerability Details : CVE-2018-8822
Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
Vulnerability category: OverflowExecute code
Products affected by CVE-2018-8822
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.16:rc:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-8822
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 26 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-8822
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-8822
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-8822
-
https://usn.ubuntu.com/3654-1/
USN-3654-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3653-2/
USN-3653-2: Linux kernel (HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3656-1/
USN-3656-1: Linux kernel (Raspberry Pi 2, Snapdragon) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3657-1/
USN-3657-1: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3654-2/
USN-3654-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4188
Debian -- Security Information -- DSA-4188-1 linuxThird Party Advisory
-
https://www.mail-archive.com/netdev@vger.kernel.org/msg223373.html
[PATCH] ncpfs: memory corruption in ncp_read_kernel()Patch
-
https://usn.ubuntu.com/3653-1/
USN-3653-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html
[PATCH] ncpfs: memory corruption in ncp_read_kernel()Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/103476
Linux Kernel CVE-2018-8822 Multiple Memory Corruption VulnerabilitiesBroken Link;Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2022/12/27/3
oss-security - Re: Details on this supposed Linux Kernel ksmbd RCEMailing List;Third Party Advisory
-
https://usn.ubuntu.com/3655-2/
USN-3655-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3655-1/
USN-3655-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4187
Debian -- Security Information -- DSA-4187-1 linuxThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
[SECURITY] [DLA 1369-1] linux security updateMailing List;Third Party Advisory
Jump to