ID

VAR-201808-1004


CVE

CVE-2018-5383


TITLE

Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

Trust: 0.8

sources: CERT/CC: VU#304725

DESCRIPTION

Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device. Multiple Bluetooth drivers are prone to a security-bypass vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks and certain unauthorized actions, which will aid in further attacks. Bluetooth is a wireless technology standard that enables short-range data exchange between fixed and mobile devices and personal area networks in buildings. The following systems are affected: macOS prior to 10.13; macOS High Sierra prior to 11.4; iOS prior to 11.4; Android prior to Patch 2018-06-05. CVE-2018-4249: Kevin Backhouse of Semmle Ltd. CVE-2018-4240: Sriram (@Sri_Hxor) of PrimeFort Pvt. CVE-2018-4199: Alex Plaskett, Georgi Geshev, Fabi Beterke, and Nils of MWR Labs working with Trend Micro's Zero Day Initiative WebKit Available for: Apple TV 4K and Apple TV (4th generation) Impact: Visiting a maliciously crafted website may leak sensitive data Description: Credentials were unexpectedly sent when fetching CSS mask images. This was addressed by using a CORS-enabled fetch method. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2018-9-17-1 iOS 12 iOS 12 is now available and addresses the following: Accounts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local app may be able to read a persistent account identifier Description: This issue was addressed with improved entitlements. CVE-2018-4322: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. Bluetooth Available for: iPhone SE, iPhone 6s, iPhone 6s Plus, iPhone 7, iPhone 7 Plus, iPad Mini 4, 12.9-inch iPad Pro 1st generation, 12.9-inch iPad Pro 2nd generation, 10.5-inch iPad Pro, 9.7-inch iPad Pro, iPad 5th generation, and iPod Touch 6th generation Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2018-5383: Lior Neumann and Eli Biham Core Bluetooth Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4330: Apple CoreMedia Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An app may be able to learn information about the current camera view before being granted camera access Description: A permissions issue existed. This issue was addressed with improved permission validation. CVE-2018-4356: an anonymous researcher IOMobileFrameBuffer Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4335: Brandon Azad iTunes Store Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker in a privileged network position may be able to spoof password prompts in the iTunes Store Description: An input validation issue was addressed with improved input validation. CVE-2018-4305: Jerry Decime Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: An input validation issue existed in the kernel. This issue was addressed with improved input validation. CVE-2018-4363: Ian Beer of Google Project Zero Messages Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to discover a user's deleted messages Description: A consistency issue existed in the handling of application snapshots. The issue was addressed with improved handling of message deletions. CVE-2018-4313: 11 anonymous researchers, David Scott, Enes Mert Ulu of Abdullah MA1/4rAide AzA1/4nenek Anadolu Lisesi - Ankara/TA1/4rkiye, Mehmet Ferit DaAtan of Van YA1/4zA1/4ncA1/4 YA+-l University, Metin Altug Karakaya of Kaliptus Medical Organization, Vinodh Swami of Western Governor's University (WGU) Notes Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to discover a user's deleted notes Description: A consistency issue existed in the handling of application snapshots. The issue was addressed with improved handling of notes deletions. CVE-2018-4352: an anonymous researcher Safari Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to discover websites a user has visited Description: A consistency issue existed in the handling of application snapshots. The issue was addressed with improved handling of application snapshots. CVE-2018-4313: 11 anonymous researchers, David Scott, Enes Mert Ulu of Abdullah MA1/4rAide AzA1/4nenek Anadolu Lisesi - Ankara/TA1/4rkiye, Mehmet Ferit DaAtan of Van YA1/4zA1/4ncA1/4 YA+-l University, Metin Altug Karakaya of Kaliptus Medical Organization, Vinodh Swami of Western Governor's University (WGU) Safari Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A user may be unable to delete browsing history items Description: Clearing a history item may not clear visits with redirect chains. The issue was addressed with improved data deletion. CVE-2018-4329: Hugo S. Diaz (coldpointblue) Safari Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious website may be able to exfiltrate autofilled data in Safari Description: A logic issue was addressed with improved state management. CVE-2018-4307: Rafay Baloch of Pakistan Telecommunications Authority SafariViewController Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Visiting a malicious website may lead to address bar spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2018-4362: Jun Kokatsu (@shhnjk) Security Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker may be able to exploit weaknesses in the RC4 cryptographic algorithm Description: This issue was addressed by removing RC4. CVE-2016-1777: Pepi Zawodsky Status Bar Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A person with physical access to an iOS device may be able to determine the last used app from the lock screen Description: A logic issue was addressed with improved restrictions. CVE-2018-4325: Brian Adeloye Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend Micro's Zero Day Initiative Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 12". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAluf5GIACgkQeC9tht7T K3G2mg//QBqaVSeHLeqL489OJmSvBtudWIDY1GhHJ5Xc8ox3ILDNLVZeBU+DIpqr Fb/slmBKhNM69CPf2fGC/Af2h3ZbUYVoANoyWfH+A/PYzFV726w5WHaq4QZndauO urHsrE/lH8CvDFS6lzp0OdGV5hVIGQ3hoYiF0lYmIdzCDQYwvFp+pn2I3b37Io8K 5/cjRiYp+uq2NAKLm6hx8yq0NtYAQyQTsk6ZAsGlilmydLJDGnaeJE80wk7EBd8f rkdtqzs5B5ohHVYLcoGgMUrE7qyLpqwXjkfIJO8bkk1IqlbMwjmhOJVRPaHWtj5Y 8Ouc2ebMfpFimk9+ODBUYMCsQJgQw8P6pW3gfSpiheIOPc65KzoaAdg+nOfmPwJK LR9CDMJauwYHf1I2RrMzDBflV1HIPurYciHBZKn6IH4f3KNIu5PGNTnHFgln6MxT D11WXuxNfvc2B1hRIRHXD2OB1+rh5Q+tkb+AEauHzIFWgl7otx6EZhiu7W8Mxa22 k6s/Fo1UZI1GbnNjU9ugEumxH8w0WQNQZOOH3FI07aA7F2FVcTVXL4uaIoHzZR0N ZmC/RvsQNGmw8L+DRWedEHda/rieAgMHkJxrjF0Day9PqY50YL7F+7qaw2J6Tmpo r5jDothh/1TQbkE5G8oOaT3Y3iOtDcMqh0T7jRxIP7awQMKce9M= =1Ld6 -----END PGP SIGNATURE----- . CVE-2018-4361: found by Google OSS-Fuzz Entry added September 24, 2018 Additional recognition Assets We would like to acknowledge Brandon Azad for their assistance. Core Data We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance. Sandbox Profiles We would like to acknowledge Tencent Keen Security Lab working with Trend Micro's Zero Day Initiative for their assistance. SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance. WebKit We would like to acknowledge Cary Hartline, Hanming Zhang from 360 Vuclan team, and Zach Malone of CA Technologies for their assistance. ========================================================================= Ubuntu Security Notice USN-4094-1 August 13, 2019 linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems - linux-kvm: Linux kernel for cloud environments - linux-oem: Linux kernel for OEM processors - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon processors - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this to cause a denial of service. (CVE-2018-13053) Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13093) Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious f2fs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13097, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14616, CVE-2018-13096, CVE-2018-13098, CVE-2018-14615) Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14609) Wen Xu discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations. An attacker could use this to construct a malicious HFS+ image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14617) Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem of the Linux kernel did not properly initialize new files in some situations. A local attacker could use this to expose sensitive information. (CVE-2018-16862) Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux kernel did not properly handle size checks when handling an extra USB descriptor. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-20169) It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. An attacker could use this to expose sensitive information. (CVE-2018-5383) It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126) Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125) It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614) It was discovered that a NULL pointer dereference vulnerabilty existed in the Near-field communication (NFC) implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2019-12818) It was discovered that the MDIO bus devices subsystem in the Linux kernel improperly dropped a device reference in an error condition, leading to a use-after-free. An attacker could use this to cause a denial of service (system crash). (CVE-2019-12819) It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-12984) Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-13233) Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272) It was discovered that the Empia EM28xx DVB USB device driver implementation in the Linux kernel contained a use-after-free vulnerability when disconnecting the device. An attacker could use this to cause a denial of service (system crash). (CVE-2019-2024) It was discovered that the USB video device class implementation in the Linux kernel did not properly validate control bits, resulting in an out of bounds buffer read. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2019-2101) It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846) It was discovered that the Appletalk IP encapsulation driver in the Linux kernel did not properly prevent kernel addresses from being copied to user space. A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information. (CVE-2018-20511) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1021-oracle 4.15.0-1021.23 linux-image-4.15.0-1040-gcp 4.15.0-1040.42 linux-image-4.15.0-1040-gke 4.15.0-1040.42 linux-image-4.15.0-1042-kvm 4.15.0-1042.42 linux-image-4.15.0-1043-raspi2 4.15.0-1043.46 linux-image-4.15.0-1050-oem 4.15.0-1050.57 linux-image-4.15.0-1060-snapdragon 4.15.0-1060.66 linux-image-4.15.0-58-generic 4.15.0-58.64 linux-image-4.15.0-58-generic-lpae 4.15.0-58.64 linux-image-4.15.0-58-lowlatency 4.15.0-58.64 linux-image-gcp 4.15.0.1040.42 linux-image-generic 4.15.0.58.60 linux-image-generic-lpae 4.15.0.58.60 linux-image-gke 4.15.0.1040.43 linux-image-gke-4.15 4.15.0.1040.43 linux-image-kvm 4.15.0.1042.42 linux-image-lowlatency 4.15.0.58.60 linux-image-oem 4.15.0.1050.54 linux-image-oracle 4.15.0.1021.24 linux-image-powerpc-e500mc 4.15.0.58.60 linux-image-powerpc-smp 4.15.0.58.60 linux-image-powerpc64-emb 4.15.0.58.60 linux-image-powerpc64-smp 4.15.0.58.60 linux-image-raspi2 4.15.0.1043.41 linux-image-snapdragon 4.15.0.1060.63 linux-image-virtual 4.15.0.58.60 Ubuntu 16.04 LTS: linux-image-4.15.0-1021-oracle 4.15.0-1021.23~16.04.1 linux-image-4.15.0-1040-gcp 4.15.0-1040.42~16.04.1 linux-image-4.15.0-1055-azure 4.15.0-1055.60 linux-image-4.15.0-58-generic 4.15.0-58.64~16.04.1 linux-image-4.15.0-58-generic-lpae 4.15.0-58.64~16.04.1 linux-image-4.15.0-58-lowlatency 4.15.0-58.64~16.04.1 linux-image-azure 4.15.0.1055.58 linux-image-gcp 4.15.0.1040.54 linux-image-generic-hwe-16.04 4.15.0.58.79 linux-image-generic-lpae-hwe-16.04 4.15.0.58.79 linux-image-gke 4.15.0.1040.54 linux-image-lowlatency-hwe-16.04 4.15.0.58.79 linux-image-oem 4.15.0.58.79 linux-image-oracle 4.15.0.1021.15 linux-image-virtual-hwe-16.04 4.15.0.58.79 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://usn.ubuntu.com/4094-1 CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617, CVE-2018-16862, CVE-2018-20169, CVE-2018-20511, CVE-2018-20856, CVE-2018-5383, CVE-2019-10126, CVE-2019-1125, CVE-2019-12614, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-2024, CVE-2019-2101, CVE-2019-3846 Package Information: https://launchpad.net/ubuntu/+source/linux/4.15.0-58.64 https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42 https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1040.42 https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1042.42 https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1050.57 https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23 https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1043.46 https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1060.66 https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1055.60 https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42~16.04.1 https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-58.64~16.04.1 https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23~16.04.1 . CVE-2018-4285: Mohamed Ghannam (@_simo36) Bluetooth Available for: MacBook Pro (15-inch, 2018), and MacBook Pro (13-inch, 2018, Four Thunderbolt 3 Ports) Other Mac models were addressed with macOS High Sierra 10.13.5. CVE-2018-4283: @panicaII working with Trend Micro's Zero Day Initiative Kernel Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, macOS High Sierra 10.13.5 Impact: Systems using IntelA(r) Core-based microprocessors may potentially allow a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution side channel Description: Lazy FP state restore instead of eager save and restore of the state upon a context switch. Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value. CVE-2018-4277: xisigr of Tencent's Xuanwu Lab (tencent.com) Perl Available for: macOS High Sierra 10.13.5 Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. Help Viewer We would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing for their assistance

Trust: 2.79

sources: NVD: CVE-2018-5383 // CERT/CC: VU#304725 // BID: 104879 // VULHUB: VHN-135414 // VULMON: CVE-2018-5383 // PACKETSTORM: 154044 // PACKETSTORM: 148644 // PACKETSTORM: 149400 // PACKETSTORM: 149516 // PACKETSTORM: 149410 // PACKETSTORM: 154049 // PACKETSTORM: 154043 // PACKETSTORM: 150118

AFFECTED PRODUCTS

vendor:googlemodel:androidscope:eqversion:7.1.2

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:8.1

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:6.0.1

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:6.0

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:8.0

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:7.0

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:mac os xscope:ltversion:10.13

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:11.4

Trust: 1.0

vendor:android open sourcemodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:broadcommodel: - scope: - version: -

Trust: 0.8

vendor:cypress semiconductormodel: - scope: - version: -

Trust: 0.8

vendor:dellmodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:qualcomm incorporatedmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-acscope:eqversion:95600

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:94620

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:94610

Trust: 0.3

vendor:intelmodel:wireless-acscope:eqversion:92600

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:eqversion:182650

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:eqversion:182600

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:eqversion:172650

Trust: 0.3

vendor:intelmodel:dual band wireless-nscope:eqversion:72650

Trust: 0.3

vendor:intelmodel:dual band wireless-nscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:926020.0.2.3

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:926020.0.2.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:926020.0.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-ac desktop kitscope:eqversion:82650

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:82650

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826020.0.2.3

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826020.0.2.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:826020.0.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:82600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.10

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.51.7.20

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.51.7.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.51.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.10.9.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726519.10.9.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:72650

Trust: 0.3

vendor:intelmodel:dual band wireless-ac for desktopscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726018.33.9.3

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726018.33.9.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:726018.0.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:72600

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.10

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.51.7.20

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.51.7.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.51.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.10.9.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316819.10.9.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:31680

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.10

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.51.7.20

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.51.7.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.51.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.10.9.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316519.10.9.1

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:31650

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316018.33.9.3

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316018.33.9.2

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:316018.0.0.0

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:eqversion:31600

Trust: 0.3

vendor:bluetoothmodel:erratumscope:eqversion:107340

Trust: 0.3

vendor:bluetoothmodel:erratumscope:eqversion:103950

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.6

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.5

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.4

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.3

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.2

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13

Trust: 0.3

vendor:applemodel:macbook proscope:eqversion:0

Trust: 0.3

vendor:applemodel:macbookscope:eqversion:0

Trust: 0.3

vendor:intelmodel:wireless-nscope:neversion:726520.60

Trust: 0.3

vendor:intelmodel:wireless-nscope:neversion:726020.60

Trust: 0.3

vendor:intelmodel:wireless-acscope:neversion:956020.60

Trust: 0.3

vendor:intelmodel:wireless-acscope:neversion:946220.60

Trust: 0.3

vendor:intelmodel:wireless-acscope:neversion:946120.60

Trust: 0.3

vendor:intelmodel:wireless-acscope:neversion:926020.60

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:neversion:1826520.60

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:neversion:1826020.60

Trust: 0.3

vendor:intelmodel:tri-band wireless-acscope:neversion:1726520.60

Trust: 0.3

vendor:intelmodel:dual band wireless-nscope:neversion:726520.60

Trust: 0.3

vendor:intelmodel:dual band wireless-nscope:neversion:726020.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:826520.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:826020.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:726520.60

Trust: 0.3

vendor:intelmodel:dual band wireless-ac for desktopscope:neversion:726020.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:726020.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316820.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316520.60

Trust: 0.3

vendor:intelmodel:dual band wireless-acscope:neversion:316020.60

Trust: 0.3

vendor:applemodel:macos security updatescope:neversion:10.13.62018

Trust: 0.3

vendor:applemodel:macos security updatescope:neversion:10.13.52018

Trust: 0.3

sources: CERT/CC: VU#304725 // BID: 104879 // CNNVD: CNNVD-201807-1882 // NVD: CVE-2018-5383

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5383
value: MEDIUM

Trust: 1.0

cret@cert.org: CVE-2018-5383
value: HIGH

Trust: 1.0

NVD: CVE-2018-5383
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201807-1882
value: MEDIUM

Trust: 0.6

VULHUB: VHN-135414
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-5383
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-5383
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2018-5383
severity: HIGH
baseScore: 7.3
vectorString: NONE
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-135414
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5383
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 5.2
version: 3.0

Trust: 1.0

cret@cert.org: CVE-2018-5383
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 5.8
version: 3.0

Trust: 1.0

sources: CERT/CC: VU#304725 // VULHUB: VHN-135414 // VULMON: CVE-2018-5383 // CNNVD: CNNVD-201807-1882 // NVD: CVE-2018-5383 // NVD: CVE-2018-5383

PROBLEMTYPE DATA

problemtype:CWE-347

Trust: 1.1

problemtype:CWE-325

Trust: 1.0

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-135414 // NVD: CVE-2018-5383

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201807-1882

TYPE

data forgery

Trust: 0.6

sources: CNNVD: CNNVD-201807-1882

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#304725

PATCH

title:Bluetooth Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82629

Trust: 0.6

title:Red Hat: Important: linux-firmware security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192169 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux-firmware vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4351-1

Trust: 0.1

title:Red Hat: CVE-2018-5383url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-5383

Trust: 0.1

title:HP: HPSBHF03585 rev. 1 - Bluetooth Pairing Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03585

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4095-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4095-1

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—August 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=746dc14fcd3f5e139648cfdc9d9039a9

Trust: 0.1

title:Apple: watchOS 4.3.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=0f4c2f01c97a0857022a69b5486be838

Trust: 0.1

title:Apple: tvOS 11.4url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=d2d0b1ec71830547fb971d63ee3beadb

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—June 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=cc496c56e2bf669809bfb568f59af8e1

Trust: 0.1

title:Apple: macOS Mojave 10.14url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=b8d65830dc3366732d9f4a144cde5cf4

Trust: 0.1

title:Apple: tvOS 12url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=cffdc08d95a71866e104f27dafdf5818

Trust: 0.1

title:Apple: macOS High Sierra 10.13.5, Security Update 2018-003 Sierra, Security Update 2018-003 El Capitanurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=f93fc5c87ddc6e336e7b02ff3308dfe6

Trust: 0.1

title:Apple: macOS High Sierra 10.13.6, Security Update 2018-004 Sierra, Security Update 2018-004 El Capitanurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=6271728c896ad06d4d117e77589eea2f

Trust: 0.1

title:Apple: iOS 11.4url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=0f3db097f895347566033494c2dda90b

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4094-1

Trust: 0.1

title:Apple: iOS 12url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=9859610dae22b7395b3a00be201bcefb

Trust: 0.1

title:Ubuntu Security Notice: linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4118-1

Trust: 0.1

title:broadcom-bt-firmwareurl:https://github.com/winterheart/broadcom-bt-firmware

Trust: 0.1

title:awesome-bluetooth-securityurl:https://github.com/engn33r/awesome-bluetooth-security

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

title:welivesecurityurl:https://www.welivesecurity.com/2018/07/24/bluetooth-bug-expose-devices/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2018/07/24/bluetooth_cryptography_bug/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/many-bluetooth-implementations-and-os-drivers-affected-by-crypto-bug/

Trust: 0.1

sources: VULMON: CVE-2018-5383 // CNNVD: CNNVD-201807-1882

EXTERNAL IDS

db:CERT/CCid:VU#304725

Trust: 2.9

db:NVDid:CVE-2018-5383

Trust: 2.9

db:BIDid:104879

Trust: 2.1

db:SECTRACKid:1041432

Trust: 1.8

db:PACKETSTORMid:157598

Trust: 0.7

db:PACKETSTORMid:153946

Trust: 0.7

db:CNNVDid:CNNVD-201807-1882

Trust: 0.7

db:LENOVOid:LEN-22233

Trust: 0.6

db:AUSCERTid:ESB-2020.1612

Trust: 0.6

db:AUSCERTid:ESB-2019.1111

Trust: 0.6

db:AUSCERTid:ESB-2019.2932

Trust: 0.6

db:AUSCERTid:ESB-2019.0501.2

Trust: 0.6

db:AUSCERTid:ESB-2019.0559

Trust: 0.6

db:PACKETSTORMid:154044

Trust: 0.2

db:PACKETSTORMid:154049

Trust: 0.2

db:VULHUBid:VHN-135414

Trust: 0.1

db:VULMONid:CVE-2018-5383

Trust: 0.1

db:PACKETSTORMid:148644

Trust: 0.1

db:PACKETSTORMid:149400

Trust: 0.1

db:PACKETSTORMid:149516

Trust: 0.1

db:PACKETSTORMid:149410

Trust: 0.1

db:PACKETSTORMid:154043

Trust: 0.1

db:PACKETSTORMid:150118

Trust: 0.1

sources: CERT/CC: VU#304725 // VULHUB: VHN-135414 // VULMON: CVE-2018-5383 // BID: 104879 // PACKETSTORM: 154044 // PACKETSTORM: 148644 // PACKETSTORM: 149400 // PACKETSTORM: 149516 // PACKETSTORM: 149410 // PACKETSTORM: 154049 // PACKETSTORM: 154043 // PACKETSTORM: 150118 // CNNVD: CNNVD-201807-1882 // NVD: CVE-2018-5383

REFERENCES

url:https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update

Trust: 2.9

url:https://access.redhat.com/errata/rhsa-2019:2169

Trust: 2.5

url:http://www.securityfocus.com/bid/104879

Trust: 2.4

url:https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html

Trust: 2.4

url:https://usn.ubuntu.com/4095-1/

Trust: 2.4

url:https://usn.ubuntu.com/4095-2/

Trust: 2.4

url:https://www.kb.cert.org/vuls/id/304725

Trust: 2.2

url:http://www.cs.technion.ac.il/~biham/bt/

Trust: 1.8

url:http://www.securitytracker.com/id/1041432

Trust: 1.8

url:https://usn.ubuntu.com/4094-1/

Trust: 1.8

url:https://usn.ubuntu.com/4118-1/

Trust: 1.8

url:https://usn.ubuntu.com/4351-1/

Trust: 1.3

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00128.html

Trust: 1.1

url:http://www.cs.technion.ac.il/~biham/bt

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/325.html

Trust: 0.8

url:https://source.android.com/security/bulletin/2018-06-01

Trust: 0.8

url:https://support.apple.com/en-us/ht208848

Trust: 0.8

url:https://source.android.com/security/bulletin/pixel/2018-06-01

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5383

Trust: 0.8

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190466-1/

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190422-1/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2932/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75986

Trust: 0.6

url:https://vigilance.fr/vulnerability/bluetooth-firmware-information-disclosure-via-weak-elliptic-curve-parameters-28536

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-22233

Trust: 0.6

url:https://packetstormsecurity.com/files/157598/ubuntu-security-notice-usn-4351-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75750

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78314

Trust: 0.6

url:https://packetstormsecurity.com/files/153946/red-hat-security-advisory-2019-2169-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1612/

Trust: 0.6

url:https://support.apple.com/kb/ht201222

Trust: 0.5

url:https://www.apple.com/support/security/pgp/

Trust: 0.5

url:https://www.bluetooth.com/

Trust: 0.3

url:https://support.apple.com/en-ie/ht208849

Trust: 0.3

url:https://support.apple.com/en-us/ht208937

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2018/jul/msg00008.html

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2018/jul/msg00009.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-12614

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-1125

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-10126

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-3846

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4363

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4305

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4313

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-1777

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-13272

Trust: 0.2

url:https://usn.ubuntu.com/4095-1

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/347.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=58464

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11599

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1054.61

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-159.187

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1122.128

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1090.101

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1118.127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4233

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4188

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4246

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4243

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4214

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4224

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4201

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4240

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4237

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4200

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4223

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4211

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4241

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4329

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4335

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4356

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4325

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4323

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4318

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4336

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4344

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4309

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4315

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4345

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4316

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4359

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4317

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4306

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4312

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4328

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4314

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4299

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2054

Trust: 0.1

url:https://usn.ubuntu.com/4095-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2024

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14610

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20856

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1050.57

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12818

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2101

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13233

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13098

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14609

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12819

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13093

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20169

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14614

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1043.46

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1042.42

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13053

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1040.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42

Trust: 0.1

url:https://usn.ubuntu.com/4094-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1055.60

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-58.64

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13099

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-58.64~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20511

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1060.66

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13100

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13096

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12984

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14617

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14064

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10784

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4288

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8777

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17405

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4276

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-6914

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4286

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-6913

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4269

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4285

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-6797

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4268

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4287

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4280

Trust: 0.1

sources: CERT/CC: VU#304725 // VULHUB: VHN-135414 // VULMON: CVE-2018-5383 // BID: 104879 // PACKETSTORM: 154044 // PACKETSTORM: 148644 // PACKETSTORM: 149400 // PACKETSTORM: 149516 // PACKETSTORM: 149410 // PACKETSTORM: 154049 // PACKETSTORM: 154043 // PACKETSTORM: 150118 // CNNVD: CNNVD-201807-1882 // NVD: CVE-2018-5383

CREDITS

Ubuntu,Red Hat

Trust: 0.6

sources: CNNVD: CNNVD-201807-1882

SOURCES

db:CERT/CCid:VU#304725
db:VULHUBid:VHN-135414
db:VULMONid:CVE-2018-5383
db:BIDid:104879
db:PACKETSTORMid:154044
db:PACKETSTORMid:148644
db:PACKETSTORMid:149400
db:PACKETSTORMid:149516
db:PACKETSTORMid:149410
db:PACKETSTORMid:154049
db:PACKETSTORMid:154043
db:PACKETSTORMid:150118
db:CNNVDid:CNNVD-201807-1882
db:NVDid:CVE-2018-5383

LAST UPDATE DATE

2026-02-06T22:17:28.423000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#304725date:2018-08-17T00:00:00
db:VULHUBid:VHN-135414date:2019-10-03T00:00:00
db:VULMONid:CVE-2018-5383date:2019-10-03T00:00:00
db:BIDid:104879date:2018-07-23T00:00:00
db:CNNVDid:CNNVD-201807-1882date:2020-05-08T00:00:00
db:NVDid:CVE-2018-5383date:2024-11-21T04:08:42.640

SOURCES RELEASE DATE

db:CERT/CCid:VU#304725date:2018-07-23T00:00:00
db:VULHUBid:VHN-135414date:2018-08-07T00:00:00
db:VULMONid:CVE-2018-5383date:2018-08-07T00:00:00
db:BIDid:104879date:2018-07-23T00:00:00
db:PACKETSTORMid:154044date:2019-08-13T17:45:06
db:PACKETSTORMid:148644date:2018-07-23T14:04:44
db:PACKETSTORMid:149400date:2018-09-17T22:22:22
db:PACKETSTORMid:149516date:2018-09-25T16:32:23
db:PACKETSTORMid:149410date:2018-09-18T02:23:50
db:PACKETSTORMid:154049date:2019-08-14T02:36:57
db:PACKETSTORMid:154043date:2019-08-13T17:45:00
db:PACKETSTORMid:150118date:2018-10-31T16:14:57
db:CNNVDid:CNNVD-201807-1882date:2018-07-26T00:00:00
db:NVDid:CVE-2018-5383date:2018-08-07T21:29:00.287