Linux Kernel up to 5.1.7 USB Device smsusb.c denial of service
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
2.0 | $0-$5k |
A vulnerability was found in Linux Kernel up to 5.1.7 (Operating System). It has been rated as problematic. This issue affects an unknown code block of the file drivers/media/usb/siano/smsusb.c of the component USB Device Handler. The manipulation with an unknown input leads to a denial of service vulnerability (NULL Pointer Dereference). Using CWE to declare the problem leads to CWE-476. Impacted is availability.
The weakness was disclosed 08/19/2019. The identification of this vulnerability is CVE-2019-15218 since 08/19/2019. Attacking locally is a requirement. Technical details of the vulnerability are known, but there is no available exploit.
Upgrading to version 5.1.8 eliminates this vulnerability.
The entries 140330, 140329, 140328 and 140326 are pretty similar.
Type
Vendor
Name
VulDB Meta Base Score: 2.1
VulDB Meta Temp Score: 2.0
VulDB Base Score: 2.1
VulDB Temp Score: 2.0
VulDB Vector: 🔒
VulDB Reliability: 🔍
AV AC Au C I A 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 Vector Complexity Authentication Confidentiality Integrity Availability unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Denial of service / NULL Pointer Dereference (CWE-476)
Local: Yes
Remote: No
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒0-Day unlock unlock unlock unlock Today unlock unlock unlock unlock
Threat Intelligence
Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Upgrade: Kernel 5.1.8
08/19/2019 Advisory disclosed
08/19/2019 CVE assigned
08/20/2019 VulDB entry created
08/20/2019 VulDB last updateVendor: kernel.org
CVE: CVE-2019-15218 (🔒)
See also: 🔒Created: 08/20/2019 07:14 AM
Complete: 🔍
Comments
See the underground prices here!
https://vuldb.com/?id.140327
Leave a Reply
You must be logged in to post a comment.
No comments yet. Please log in to comment.