ID |
CVE-2018-10932
|
Summary |
lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:intel:lldptool:0.9.41:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:0.9.41:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:lldptool:0.9.42:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:0.9.42:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:lldptool:0.9.43:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:0.9.43:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:lldptool:0.9.44:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:0.9.44:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:lldptool:0.9.45:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:0.9.45:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:lldptool:0.9.46:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:0.9.46:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:lldptool:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:intel:lldptool:1.0.1:*:*:*:*:*:*:*
|
CVSS |
Base: | 3.3 (as of 12-02-2023 - 23:31) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-117 |
CAPEC |
-
Web Logs Tampering
Web Logs Tampering attacks involve an attacker injecting, deleting or otherwise tampering with the contents of web logs typically for the purposes of masking other malicious behavior. Additionally, writing malicious data to log files may target jobs, filters, reports, and other agents that process the logs in an asynchronous attack pattern. This pattern of attack is similar to "Log Injection-Tampering-Forging" except that in this case, the attack is targeting the logs of the web server and not the application.
-
Log Injection-Tampering-Forging
This attack targets the log files of the target host. The attacker injects, manipulates or forges malicious log entries in the log file, allowing him to mislead a log audit, cover traces of attack, or perform other malicious actions. The target host is not properly controlling log access. As a result tainted data is resulting in the log files leading to a failure in accountability, non-repudiation and incident forensics capability.
-
Audit Log Manipulation
The attacker injects, manipulates, deletes, or forges malicious log entries into the log file, in an attempt to mislead an audit of the log file or cover tracks of an attack. Due to either insufficient access controls of the log files or the logging mechanism, the attacker is able to perform such actions.
|
Access |
Vector | Complexity | Authentication |
ADJACENT_NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:A/AC:L/Au:N/C:N/I:P/A:N
|
redhat
via4
|
advisories | bugzilla | id | 1727326 | title | lldpad memory usage increases over time |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 8 is installed | oval | oval:com.redhat.rhba:tst:20193384074 |
OR | AND | comment | lldpad is earlier than 0:1.0.1-13.git036e314.el8 | oval | oval:com.redhat.rhsa:tst:20193673001 |
comment | lldpad is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20193673002 |
|
AND | comment | lldpad-debugsource is earlier than 0:1.0.1-13.git036e314.el8 | oval | oval:com.redhat.rhsa:tst:20193673003 |
comment | lldpad-debugsource is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20193673004 |
|
|
|
|
| rhsa | id | RHSA-2019:3673 | released | 2019-11-05 | severity | Low | title | RHSA-2019:3673: lldpad security and bug fix update (Low) |
|
| rpms | - lldpad-0:1.0.1-13.git036e314.el8
- lldpad-debuginfo-0:1.0.1-13.git036e314.el8
- lldpad-debugsource-0:1.0.1-13.git036e314.el8
|
|
refmap
via4
|
|
Last major update |
12-02-2023 - 23:31 |
Published |
21-08-2018 - 18:29 |
Last modified |
12-02-2023 - 23:31 |