CVE-2018-11806
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
13/06/2018
Last modified:
04/08/2021
Description
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
Impact
Base Score 3.x
8.20
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.12.1 (including) | |
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2018/06/07/1
- http://www.securityfocus.com/bid/104400
- https://access.redhat.com/errata/RHSA-2018:2462
- https://access.redhat.com/errata/RHSA-2018:2762
- https://access.redhat.com/errata/RHSA-2018:2822
- https://access.redhat.com/errata/RHSA-2018:2887
- https://access.redhat.com/errata/RHSA-2019:2892
- https://bugzilla.redhat.com/show_bug.cgi?id=1586245
- https://lists.debian.org/debian-lts-announce/2019/05/msg00010.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html
- https://seclists.org/bugtraq/2019/May/76
- https://usn.ubuntu.com/3826-1/
- https://www.debian.org/security/2019/dsa-4454
- https://www.zerodayinitiative.com/advisories/ZDI-18-567/



