{ "id": "CVE-2018-5390", "sourceIdentifier": "cret@cert.org", "published": "2018-08-06T20:29:01.570", "lastModified": "2023-11-07T02:58:42.387", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service." }, { "lang": "es", "value": "El kernel de Linux en versiones 4.9 y siguientes pueden forzarse a realizar llamadas muy caras a tcp_collapse_ofo_queue() y tcp_prune_ofo_queue() para cada paquete entrante, lo que puede conducir a una denegaci\u00f3n de servicio." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-400" } ] }, { "source": "37e5125f-f79b-445b-8fad-9564f167944b", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-400" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "2EDC8561-5E0A-4692-BB71-C88ED7A1229F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.9", "versionEndExcluding": "4.18", "matchCriteriaId": "D6E2A48A-1AFB-4878-AE78-18613DE9334F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "0758920B-F8FC-44AB-92E3-CB0B0A5EDA76" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "81EBA79F-0ABF-4213-8BEF-9A927F9E24D4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "matchCriteriaId": "364BE028-0C54-4254-9261-59D97C0EDC1F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "matchCriteriaId": "C5CD0194-46B1-4CCC-9829-8ED014B77660" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "matchCriteriaId": "DB2B91AF-ACE1-4F6F-B2D0-9D4B7D8D20CE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "matchCriteriaId": "30FBD992-DD41-441E-A6C7-D39DAC45DA34" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.2.7.1", "matchCriteriaId": "4A3E8408-DE01-4B3C-9FDF-A51261C524BD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.0", "versionEndIncluding": "6.6.9", "matchCriteriaId": "0E49DB15-06E7-4709-933E-890A7E65A240" }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7.0", "versionEndIncluding": "6.7.5", "matchCriteriaId": "A29A8C01-7E4E-4662-B4F3-07DEF07CC600" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "41E6AF24-0676-4B70-A289-7B81321194DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "6BB42D3A-71EE-4367-9F65-86404D74E59D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "1331467F-B278-485E-AD91-7D0643C2F3DB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "44E8F4B6-ACF1-4F2C-A2A4-DF7382CCE628" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "195704A8-4911-4A61-8369-711D403052F1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "E5011C2D-FBB5-4117-BB97-11DE70117345" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "E866C4E5-D739-4352-9B6D-9753B4C78A24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1FDA72E-991D-4451-9C8E-E738F4D12728" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "DDE5A2D0-C268-4D2D-A001-AEC17E92B1DA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "79344F94-2CB8-4F08-9373-61614A38476C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "42D16634-442B-4674-B11E-6748D28764BD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "622C877B-760A-4C50-9FDF-998C010B864E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "7FA10863-C4C8-4658-8EEA-BC71B3522F36" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "E5D00EED-F95D-4458-BDC4-3390DE85348B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "1D91EC11-DD9A-434B-9EB4-14AA0E977D8D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "292EC144-CBA2-4275-9F70-4ED65A505B39" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "E6EC3436-7FAE-4311-8103-7ADBAF40E1C1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "397AC4A5-B67C-483B-84F7-8CB294BB460C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "E697E4FD-1882-4BF8-9B9F-FB7DFD19497B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "80509490-50DA-42F8-8A4A-A6F6B95649BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "18A39E28-E7BB-47A3-988B-4EBF070D3538" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "1466F808-2596-4028-8884-27EDD5CACB47" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "394DF290-9328-4FAD-B04E-61F62B916148" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7BBEC67-BD2E-49D5-8294-977D975D98D0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1.", "versionEndIncluding": "11.6.3", "matchCriteriaId": "D931BC21-AF80-400C-A7E9-2C4AB19D748A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "6A11E433-943D-4D92-B45E-3FA268094278" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "96AA67E0-3471-4699-87A7-E47DD8E313B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB76D898-4C7C-40E9-8539-E2A1BC7A5A66" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "8C3C9586-D4ED-4486-9C1F-B357F34F8A84" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "D4C3D6F5-D94D-46A3-991C-A11275B59F8E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "6114B091-1612-4EA2-81D4-2E5455A345F7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "86D68F26-EF89-4016-BD3A-637951752AAA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "9F002114-483A-462C-B0BD-4E1591009935" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "57CCB85A-6F90-4DB7-B0F8-AE5250E1DCFE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "36F60067-2623-42F9-8B4F-C24F3268DDB9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADAD6E9A-F8B5-4B2D-B687-AEAB518B8F19" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "6DE3443E-9D07-4A82-B110-02ADDA9FDEF3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "60189636-02D6-44CA-BE2A-7777E3C409CD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "68E2840B-96F4-4437-91D1-4AFE99E54D6A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "23E592A7-B530-4932-A81D-D1B9ABD64047" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "5D08BA8F-4949-47EC-8EEF-312DC70043B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.0.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "47D07AA7-1E0E-4FC3-B8BF-05729619B0AA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartExcluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "A197CF35-47EE-4DAE-BC51-90663870B9B9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E734E1C-A92F-4394-8F33-4429161BE47C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "4C9A0A9D-40AF-46DC-B577-DA73B4C2970B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "5AD75094-3248-4D37-969E-75272F6F31D6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "15F4D416-10F4-4C08-A25D-0795F7FE0FBE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CF10213-FBE4-47A5-8EF2-B45BF15BEB6D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.5.1", "versionEndIncluding": "11.6.3", "matchCriteriaId": "A36B6B7D-3900-43D4-B241-E58A1377B4DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.3", "matchCriteriaId": "E7860523-E8B3-4BEE-853A-6F0B5BCDDA5A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0.0", "versionEndIncluding": "13.1.1", "matchCriteriaId": "D6944128-3A30-4835-A125-3EA7571D7DC0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5A85C15-B821-4992-9B06-45767E7467D2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.0.0", "versionEndIncluding": "5.1.0", "matchCriteriaId": "A87510FE-775A-44FB-9792-074CD5DE5C38" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B5497D9-9022-4788-87DB-6C4B4116509A" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BB85F4D0-A104-4954-8D73-B9980C8E93E0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*", "matchCriteriaId": "CECB4DA3-3842-4102-8451-43EC00CBAEA8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D286AC5-DB3E-4FAE-8441-A4D98B1F1160" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*", "matchCriteriaId": "8DE427D5-6E9A-4AC3-830D-7D235DE97389" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*", "matchCriteriaId": "F32591D5-D7F6-4C45-B1B5-1D1F8C649DF0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "032B2E4E-381E-4662-A6CF-8FA517233681" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*", "matchCriteriaId": "BA708DD0-8A88-4B2B-9B57-A08491DE4696" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0013CA3E-0E73-45EA-B2E9-7EA038BAB336" }, { "vulnerable": true, "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*", "matchCriteriaId": "F993C993-D118-45A3-9F95-382B54E25439" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E53CEDB-F536-4DA0-917C-C220A3102B90" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "27A026D0-AA0D-417A-A06B-8785E5FFCBC9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*", "matchCriteriaId": "31DF55CF-FEDE-43DE-8F55-3264DB7CDD71" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4C837B-4648-4764-B190-36381EE7E664" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "F044DA47-D8FA-4EF9-B28C-C69D0DE8C3DC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "E600BCEC-2466-4348-ACE3-955469AA1C9E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "AB8DD876-7E51-43A9-8944-B4DEE9E9EDD3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*", "matchCriteriaId": "431A3000-D903-4B57-9B54-CC650105B044" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8E7428A-D2A5-4B77-8562-F75BB8C72976" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "84E53549-337C-423F-AB34-F2559C1F225C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EABDA6F4-99E7-4354-9760-E9891B47DC8A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:network_assurance_engine:2.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD40D143-B4B4-4C2A-8D9E-D928459FC59E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2B5B87A-CECF-48BF-833E-6E4A6DF647CC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A108A5-ADB1-4328-B3C0-9C3CC2CD1346" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE0F9723-F9BD-422D-8414-040C01C9C0D0" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B534882-60A5-4098-A439-A47CBC546E53" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB1C3395-1865-4436-81E0-3821B5BB99D2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "86ACAFA3-7F76-428A-A6EE-87284FB30B01" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "8908328C-FC17-4BDC-B369-36942225DFAD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "988EDFD9-4652-4460-BE48-62219B8A0A6D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9DD18A-43B9-4B43-AF9F-236D42651E46" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "177FA398-F812-4E8D-99A3-3F7E0F690CE6" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A8F173C-2D38-42B2-B86F-72B53A96D05D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "27E03126-0FF6-4D4E-8766-A4F0B20741AC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F24CB2EC-A79E-4C56-8F03-86D53A9B28A3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4F2333B-BE03-4D6C-AA16-1E3EB170496E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B199BF45-F9EF-49A0-B2D5-9B9FA6AA1208" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C65475E-2641-404B-8316-6B6A5029617D" } ] } ] } ], "references": [ { "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2", "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3", "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4", "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/104976", "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1041424", "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1041434", "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2384", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2395", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2402", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2403", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2645", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2776", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2785", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2789", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2790", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2791", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2924", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2933", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2948", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20180815-0003/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://support.f5.com/csp/article/K95343321", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS", "source": "cret@cert.org" }, { "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3732-1/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3732-2/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3741-1/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3741-2/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3742-1/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3742-2/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://usn.ubuntu.com/3763-1/", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", "source": "cret@cert.org", "tags": [ "Mitigation", "Third Party Advisory" ] }, { "url": "https://www.debian.org/security/2018/dsa-4266", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.kb.cert.org/vuls/id/962459", "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ] }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "source": "cret@cert.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://www.synology.com/support/security/Synology_SA_18_41", "source": "cret@cert.org", "tags": [ "Third Party Advisory" ] } ] }