ID CVE-2018-10932
Summary lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.
References
Vulnerable Configurations
  • cpe:2.3:a:intel:lldptool:0.9.41:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:0.9.41:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:lldptool:0.9.42:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:0.9.42:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:lldptool:0.9.43:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:0.9.43:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:lldptool:0.9.44:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:0.9.44:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:lldptool:0.9.45:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:0.9.45:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:lldptool:0.9.46:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:0.9.46:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:lldptool:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:intel:lldptool:1.0.1:*:*:*:*:*:*:*
CVSS
Base: 3.3 (as of 12-02-2023 - 23:31)
Impact:
Exploitability:
CWE CWE-117
CAPEC
  • Web Logs Tampering
    Web Logs Tampering attacks involve an attacker injecting, deleting or otherwise tampering with the contents of web logs typically for the purposes of masking other malicious behavior. Additionally, writing malicious data to log files may target jobs, filters, reports, and other agents that process the logs in an asynchronous attack pattern. This pattern of attack is similar to "Log Injection-Tampering-Forging" except that in this case, the attack is targeting the logs of the web server and not the application.
  • Log Injection-Tampering-Forging
    This attack targets the log files of the target host. The attacker injects, manipulates or forges malicious log entries in the log file, allowing him to mislead a log audit, cover traces of attack, or perform other malicious actions. The target host is not properly controlling log access. As a result tainted data is resulting in the log files leading to a failure in accountability, non-repudiation and incident forensics capability.
  • Audit Log Manipulation
    The attacker injects, manipulates, deletes, or forges malicious log entries into the log file, in an attempt to mislead an audit of the log file or cover tracks of an attack. Due to either insufficient access controls of the log files or the logging mechanism, the attacker is able to perform such actions.
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:A/AC:L/Au:N/C:N/I:P/A:N
redhat via4
advisories
bugzilla
id 1727326
title lldpad memory usage increases over time
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 8 is installed
      oval oval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • comment lldpad is earlier than 0:1.0.1-13.git036e314.el8
          oval oval:com.redhat.rhsa:tst:20193673001
        • comment lldpad is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20193673002
      • AND
        • comment lldpad-debugsource is earlier than 0:1.0.1-13.git036e314.el8
          oval oval:com.redhat.rhsa:tst:20193673003
        • comment lldpad-debugsource is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20193673004
rhsa
id RHSA-2019:3673
released 2019-11-05
severity Low
title RHSA-2019:3673: lldpad security and bug fix update (Low)
rpms
  • lldpad-0:1.0.1-13.git036e314.el8
  • lldpad-debuginfo-0:1.0.1-13.git036e314.el8
  • lldpad-debugsource-0:1.0.1-13.git036e314.el8
refmap via4
confirm
Last major update 12-02-2023 - 23:31
Published 21-08-2018 - 18:29
Last modified 12-02-2023 - 23:31
Back to Top