CVE-2018-16871
CVSS V2 Medium 5
CVSS V3 High 7.5
Description
A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
Overview
- CVE ID
- CVE-2018-16871
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2019-07-30T17:15:12
- Last Modified Date
- 2023-02-12T23:32:31
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 1 | OR | 3.0 | 4.20 |
AND | ||||
cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- PARTIAL
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/errata/RHSA-2019:1873 | |
https://access.redhat.com/errata/RHSA-2019:1891 | |
https://access.redhat.com/errata/RHSA-2019:2696 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2730 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0740 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:1567 | |
https://access.redhat.com/errata/RHSA-2020:1769 | |
https://access.redhat.com/security/cve/CVE-2018-16871 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1655162 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871 | Issue Tracking Third Party Advisory |
https://security.netapp.com/advisory/ntap-20211004-0002/ | Third Party Advisory |
https://support.f5.com/csp/article/K18657134 | Third Party Advisory |
https://support.f5.com/csp/article/K18657134?utm_source=f5support&%3Butm_medium=RSS |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2018-16871 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 15:43:40 | Added to TrackCVE | |||
2022-12-04 00:09:04 | 2019-07-30T17:15Z | 2019-07-30T17:15:12 | CVE Published Date | updated |
2022-12-04 00:09:04 | 2022-04-11T20:42:48 | CVE Modified Date | updated | |
2022-12-04 00:09:04 | Analyzed | Vulnerability Status | updated | |
2023-02-02 23:09:08 | 2023-02-02T21:18:14 | CVE Modified Date | updated | |
2023-02-02 23:09:08 | Analyzed | Modified | Vulnerability Status | updated |
2023-02-02 23:09:08 | A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost. | A flaw was found in the Linux kernel's NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost. | Description | updated |
2023-02-02 23:09:09 | References | updated | ||
2023-02-13 01:09:25 | 2023-02-12T23:32:31 | CVE Modified Date | updated | |
2023-02-13 01:09:26 | A flaw was found in the Linux kernel's NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost. | A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost. | Description | updated |