ID

VAR-201809-1153


CVE

CVE-2018-5391


TITLE

Linux kernel IP fragment re-assembly vulnerable to denial of service

Trust: 0.8

sources: CERT/CC: VU#641765

DESCRIPTION

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. Linux Kernel is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. (BZ#1632422) 4. (BZ#1625330) 4. 6.7) - i386, ppc64, s390x, x86_64 3. Bug Fix(es): * Previously, the kernel source code lacked support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected". This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)", where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1629634) 4. ========================================================================== Ubuntu Security Notice USN-3742-3 August 21, 2018 linux-lts-trusty regressions ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: USN-3742-2 introduced regressions in the Linux Hardware Enablement (HWE) kernel for Ubuntu 12.04 ESM. Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM Details: USN-3742-2 introduced mitigations in the Linux Hardware Enablement (HWE) kernel for Ubuntu 12.04 ESM to address L1 Terminal Fault (L1TF) vulnerabilities (CVE-2018-3620, CVE-2018-3646). Unfortunately, the update introduced regressions that caused kernel panics when booting in some environments as well as preventing Java applications from starting. We apologize for the inconvenience. Original advisory details: It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-3620) Andrey Konovalov discovered an out-of-bounds read in the POSIX timers subsystem in the Linux kernel. (CVE-2018-5391) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: linux-image-3.13.0-156-generic 3.13.0-156.206~precise1 linux-image-3.13.0-156-generic-lpae 3.13.0-156.206~precise1 linux-image-generic-lpae-lts-trusty 3.13.0.156.146 linux-image-generic-lts-trusty 3.13.0.156.146 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 6.5) - x86_64 3. Bug Fix(es): * Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). (BZ#1629632) 4. Bug Fix(es): These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3674801 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2924-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2924 Issue date: 2018-10-16 CVE Names: CVE-2018-5390 CVE-2018-5391 CVE-2018-10675 CVE-2018-14634 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.6) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.6) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) * kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634. Bug Fix(es): * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625334) * Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629633) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.6): Source: kernel-2.6.32-504.76.2.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-504.76.2.el6.noarch.rpm kernel-doc-2.6.32-504.76.2.el6.noarch.rpm kernel-firmware-2.6.32-504.76.2.el6.noarch.rpm x86_64: kernel-2.6.32-504.76.2.el6.x86_64.rpm kernel-debug-2.6.32-504.76.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.76.2.el6.x86_64.rpm kernel-devel-2.6.32-504.76.2.el6.x86_64.rpm kernel-headers-2.6.32-504.76.2.el6.x86_64.rpm perf-2.6.32-504.76.2.el6.x86_64.rpm perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 6.6): Source: kernel-2.6.32-504.76.2.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-504.76.2.el6.noarch.rpm kernel-doc-2.6.32-504.76.2.el6.noarch.rpm kernel-firmware-2.6.32-504.76.2.el6.noarch.rpm x86_64: kernel-2.6.32-504.76.2.el6.x86_64.rpm kernel-debug-2.6.32-504.76.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.76.2.el6.x86_64.rpm kernel-devel-2.6.32-504.76.2.el6.x86_64.rpm kernel-headers-2.6.32-504.76.2.el6.x86_64.rpm perf-2.6.32-504.76.2.el6.x86_64.rpm perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.6): x86_64: kernel-debug-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.76.2.el6.x86_64.rpm perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm python-perf-2.6.32-504.76.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 6.6): x86_64: kernel-debug-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.76.2.el6.x86_64.rpm perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm python-perf-2.6.32-504.76.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.76.2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/cve/CVE-2018-5391 https://access.redhat.com/security/cve/CVE-2018-10675 https://access.redhat.com/security/cve/CVE-2018-14634 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/3553061 https://access.redhat.com/security/vulnerabilities/mutagen-astronomy 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW8X6otzjgjWX9erEAQj5OQ/+O0GjLYqyc0dlDxIBFWYXEGkMxGpwpgR1 HpF5FKVo32x78i8M/mQXTEtnwJxfGH+ABkYUPmiJxfyhKuuNptNEg/rD02HRjuC5 GmZG8CEloGu8NGPu3CEEPrRpK2sqVf2F+KqM9MKjMr+++8DxwXy8eSOSDRI/yJyI /xQhUPPx7g+ZZuoXs5Fh6ckfuDIFwn3gT6tqmet59WcL5L1phr1grDyeP6NbrLLY UFEAbjs9x6TDnwbUM5DnDflBENhJElamSgClObp0UOa31FCI1okO8rW1qCL/HYhY z2avZB31qCwtCM/5nCg104+xKO3Bqz3QcCtkL4m7gRWmPvATpOUweI9ptYW69iwF 2Bmr+25h2yVLvfAhqVvCGnRqAdPoSBYoasZR94oF9ctjOu66uWdT7h12oiPlFEFh oZXfozGdb+HdX18/If/2vzPskuZ/EGwbOJn3IHSmuru2oIBHrIHZ5X3ke6gtHeIN Pby2IS10QpCng48r+278ifFkPyG0Y1XmalapBHPadpWy3htPQEr9YmGehEGiyKMz hgD8rss/D7HTS/o+FGE8sE9yjEWpCbUcPWu5u7Rw8chAut8GHVHAvCRgCcUK5puo rmse06Ba+bjUh3OucXsHmsk8VQ+STC4xt1cTbnDTd1xELrH8J+qv8fGV84sdEAaj K3wXCIrtY5U=osL7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 3.06

sources: NVD: CVE-2018-5391 // CERT/CC: VU#641765 // BID: 105108 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // PACKETSTORM: 148912 // PACKETSTORM: 150312 // PACKETSTORM: 149543 // PACKETSTORM: 148914 // PACKETSTORM: 149832 // PACKETSTORM: 149024 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 149826 // PACKETSTORM: 148916 // PACKETSTORM: 148913

AFFECTED PRODUCTS

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.6

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.7

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.1

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:11.6.5.1

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1803

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:simatic rf186ciscope:ltversion:1.3

Trust: 1.0

vendor:siemensmodel:simatic rf188scope:ltversion:1.3

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:11.6.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1543-1scope:ltversion:2.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1542sp-1scope:ltversion:2.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.2.4

Trust: 1.0

vendor:siemensmodel:sinema remote connect serverscope:gteversion:1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance m-800scope:ltversion:6.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1709

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:13.1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:12.1.5

Trust: 1.0

vendor:siemensmodel:sinema remote connect serverscope:ltversion:2.0.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:microsoftmodel:windows 8.1scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion:1803

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion:r2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:4.18

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:simatic net cp 1543sp-1scope:ltversion:2.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.1

Trust: 1.0

vendor:siemensmodel:simatic rf188ciscope:ltversion:1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:siemensmodel:simatic rf186cscope:ltversion:1.3

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:11.6.5.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.9

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion:1709

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-7 lte euscope:ltversion:3.2

Trust: 1.0

vendor:siemensmodel:scalance s615scope:ltversion:6.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:scalance w700 ieee 802.11a\/b\/g\/nscope:ltversion:6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.3

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox iiscope:ltversion:2.13.3

Trust: 1.0

vendor:siemensmodel:simatic net cp 1242-7scope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.1.2.4

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1607

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rm1224scope:ltversion:6.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:12.1.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion:r2

Trust: 1.0

vendor:microsoftmodel:windows rt 8.1scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance sc-600scope:ltversion:2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-1scope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:11.6.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-7 lte usscope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:12.1.5

Trust: 1.0

vendor:siemensmodel:simatic net cp 1542sp-1 ircscope:ltversion:2.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.1

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1703

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:13.1.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.5.1

Trust: 1.0

vendor:siemensmodel:simatic net cp 1243-8 ircscope:ltversion:3.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:13.1.3

Trust: 1.0

vendor:siemensmodel:scalance w1700 ieee 802.11acscope:ltversion:2.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:siemensmodel:simatic rf185cscope:ltversion:1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.2.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:aristamodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.1.20

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.8

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.5fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.5.1fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:20120

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc3scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.5

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:7

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.4fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.1

Trust: 0.3

vendor:linuxmodel:kernel 4.14-rc5scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1018030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.10

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:18030

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.4.1fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.73

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:8.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.13

Trust: 0.3

vendor:microsoftmodel:windows rtscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows server r2 for itanium-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:8.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.3

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.1

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:8.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:aristamodel:extendible operating system 4.21.0fscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.10

Trust: 0.3

vendor:linuxmodel:kernel 4.13-rc1scope: - version: -

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.7mscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.3

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.9

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.1fscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.12

Trust: 0.3

vendor:linuxmodel:kernel 4.14.0-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rcscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.6

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:100

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.8

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.4

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.13

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.4

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20160

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.6fscope: - version: -

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux esmscope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.11

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.8mscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.8

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.17

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.3

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.14

Trust: 0.3

vendor:linuxmodel:kernel 4.12-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.10

Trust: 0.3

vendor:redhatmodel:enterprise mrgscope:eqversion:2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.2

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1016070

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.9

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.79

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.1

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.2fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:8.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.7

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.5

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.3

Trust: 0.3

vendor:aristamodel:extendible operating systemscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.0.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:18.04

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:linuxmodel:kernel 4.15-rc5scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.1

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017030

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.3fscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017090

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.7

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.5.2fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:6.1.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:17090

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:100

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.8

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.15.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1016070

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.0fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.1

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1018030

Trust: 0.3

vendor:aristamodel:extendible operating system 4.20.2.1fscope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernel 4.17-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.10.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.12.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.17.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.14.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.11.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.13

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017030

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017090

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.10

Trust: 0.3

vendor:linuxmodel:kernel 4.14-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 4.16-rc7scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#641765 // BID: 105108 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5391
value: HIGH

Trust: 1.0

NVD: CVE-2018-5391
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201808-570
value: HIGH

Trust: 0.6

VULHUB: VHN-135422
value: HIGH

Trust: 0.1

VULMON: CVE-2018-5391
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5391
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2018-5391
severity: HIGH
baseScore: 7.8
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-135422
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5391
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#641765 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-400

Trust: 1.0

sources: VULHUB: VHN-135422 // NVD: CVE-2018-5391

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201808-570

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201808-570

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=84156

Trust: 0.6

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182846 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183459 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182785 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182925 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4272-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c4fc75c3940ecd62e6e3d43c90c1ead1

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182791 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182924 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183590 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183540 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182933 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183586 - Security Advisory

Trust: 0.1

title:Arch Linux Advisories: [ASA-201903-11] linux-hardened: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201903-11

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-2

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerability in the Linux kernel affects IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products (CVE-2018-5391)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=0e5803196f7b186e3c0e200d43325ad6

Trust: 0.1

title:Red Hat: CVE-2018-5391url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-5391

Trust: 0.1

title:Cisco: Linux Kernel IP Fragment Reassembly Denial of Service Vulnerability Affecting Cisco Products: August 2018url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180824-linux-ip-fragment

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-1

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2018-5391

Trust: 0.1

title:Ubuntu Security Notice: linux regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-3

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-2

Trust: 0.1

title:IBM: IBM Security Bulletin: This Power System update is being released to address CVE-2018-5391url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=c5babfeb02fdf3e145c777d8eb6dfd0f

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-1

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerability (CVE-2018-5391)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=cb5671de27781f97454cf1b56d2087e0

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM MQ Appliance is affected by a kernel vulnerability (CVE-2018-5391)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=4b24750b4f4494d02c26c4b32a0e107a

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-3

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-1

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=d3eead9065d15844d9f0f319ebc3ef51

Trust: 0.1

title:Amazon Linux AMI: ALAS-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2018-1058

Trust: 0.1

title:Amazon Linux 2: ALAS2-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2018-1058

Trust: 0.1

title:Palo Alto Networks Security Advisory: url:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=0944feb15e174ce784cc2c5c40d923ea

Trust: 0.1

title:Red Hat: Important: kernel-alt security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182948 - Security Advisory

Trust: 0.1

title:Palo Alto Networks Security Advisory: CVE-2018-5391 Information about FragmentSmack findingsurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=3c616fb9e55ec6924cfd6ba2622c6c7e

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183083 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183096 - Security Advisory

Trust: 0.1

title:Symantec Security Advisories: Linux Kernel Aug 2017 - Sep 2018 Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=b3193a96468975c04eb9f136ca9abec4

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=75b9d198a73a91d81765c8b428423224

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=204a1aa9ebf7b5f47151e8b011269862

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=05b5bbd6fb289370b459faf1f4e3919d

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=9cb9a8ed428c6faca615e91d2f1a216d

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been fixed in IBM Security Privileged Identity Manager Appliance.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f5bb2b180c7c77e5a02747a1f31830d9

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM API Connect has addressed multiple vulnerabilities in Developer Portal’s dependencies – Cumulative list from June 28, 2018 to December 13, 2018url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=43da2cd72c1e378d8d94ecec029fcc61

Trust: 0.1

title:my_refurl:https://github.com/chetanshirke/my_ref

Trust: 0.1

title: - url:https://github.com/ozipoetra/natvps-dns

Trust: 0.1

title:cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/windows-systems-vulnerable-to-fragmentsmack-90s-like-dos-bug/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/linux/two-ddos-friendly-bugs-fixed-in-linux-kernel/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/over-80-cisco-products-affected-by-fragmentsmack-dos-bug/

Trust: 0.1

sources: VULMON: CVE-2018-5391 // CNNVD: CNNVD-201808-570

EXTERNAL IDS

db:NVDid:CVE-2018-5391

Trust: 3.2

db:CERT/CCid:VU#641765

Trust: 2.9

db:BIDid:105108

Trust: 2.1

db:OPENWALLid:OSS-SECURITY/2019/06/28/2

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2019/07/06/4

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2019/07/06/3

Trust: 1.8

db:SIEMENSid:SSA-377115

Trust: 1.8

db:SECTRACKid:1041476

Trust: 1.8

db:SECTRACKid:1041637

Trust: 1.8

db:CNNVDid:CNNVD-201808-570

Trust: 0.7

db:AUSCERTid:ESB-2019.0545

Trust: 0.6

db:AUSCERTid:ESB-2019.0623

Trust: 0.6

db:AUSCERTid:ESB-2019.0854

Trust: 0.6

db:AUSCERTid:ESB-2020.1315

Trust: 0.6

db:AUSCERTid:ESB-2019.0675

Trust: 0.6

db:ICS CERTid:ICSA-20-105-05

Trust: 0.6

db:PACKETSTORMid:148928

Trust: 0.1

db:VULHUBid:VHN-135422

Trust: 0.1

db:VULMONid:CVE-2018-5391

Trust: 0.1

db:PACKETSTORMid:148912

Trust: 0.1

db:PACKETSTORMid:150312

Trust: 0.1

db:PACKETSTORMid:149543

Trust: 0.1

db:PACKETSTORMid:148914

Trust: 0.1

db:PACKETSTORMid:149832

Trust: 0.1

db:PACKETSTORMid:149024

Trust: 0.1

db:PACKETSTORMid:149830

Trust: 0.1

db:PACKETSTORMid:150191

Trust: 0.1

db:PACKETSTORMid:149826

Trust: 0.1

db:PACKETSTORMid:148916

Trust: 0.1

db:PACKETSTORMid:148913

Trust: 0.1

sources: CERT/CC: VU#641765 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // BID: 105108 // PACKETSTORM: 148912 // PACKETSTORM: 150312 // PACKETSTORM: 149543 // PACKETSTORM: 148914 // PACKETSTORM: 149832 // PACKETSTORM: 149024 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 149826 // PACKETSTORM: 148916 // PACKETSTORM: 148913 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

REFERENCES

url:http://www.securityfocus.com/bid/105108

Trust: 3.0

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

Trust: 2.4

url:https://www.kb.cert.org/vuls/id/641765

Trust: 2.2

url:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f

Trust: 2.1

url:https://usn.ubuntu.com/3740-1/

Trust: 2.1

url:https://usn.ubuntu.com/3740-2/

Trust: 2.1

url:https://usn.ubuntu.com/3741-1/

Trust: 2.1

url:https://usn.ubuntu.com/3741-2/

Trust: 2.1

url:https://usn.ubuntu.com/3742-1/

Trust: 2.1

url:https://usn.ubuntu.com/3742-2/

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2018:2791

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2924

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2925

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2933

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:3459

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:3586

Trust: 1.9

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2018-004.txt

Trust: 1.8

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en

Trust: 1.8

url:https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20181003-0002/

Trust: 1.8

url:https://www.debian.org/security/2018/dsa-4272

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/06/28/2

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/07/06/3

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/07/06/4

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2785

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2846

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2948

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3083

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3096

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3540

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3590

Trust: 1.8

url:http://www.securitytracker.com/id/1041476

Trust: 1.8

url:http://www.securitytracker.com/id/1041637

Trust: 1.8

url:https://www.arista.com/en/support/advisories-notices/security-advisories/5782-security-advisory-37

Trust: 1.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180022

Trust: 1.1

url:https://support.f5.com/csp/article/k74374841?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5391

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2018-5391

Trust: 0.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk134253

Trust: 0.8

url:https://security-tracker.debian.org/tracker/cve-2018-5391

Trust: 0.8

url:https://access.redhat.com/articles/3553061https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-5391

Trust: 0.8

url:https://www.suse.com/security/cve/cve-2018-5391

Trust: 0.8

url:https://people.canonical.com/

Trust: 0.8

url:https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-690

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-5390

Trust: 0.6

url:https://support.f5.com/csp/article/k74374841?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190541-1.html

Trust: 0.6

url:https://security.business.xerox.com/wp-content/uploads/2019/11/cert_security_mini_bulletin_xrx19ak_for_altalinkb80xx-c80xx.pdf

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10872368

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1315/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75930

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190123-01-linux-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76246

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10792535

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76474

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180824-linux-ip-fragment

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-105-05

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77246

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200115-01-linux-cn

Trust: 0.6

url:https://www.us-cert.gov/ics/advisories/icsa-20-105-05

Trust: 0.6

url:https://wiki.ubuntu.com/securityteam/knowledgebase/l1tf

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-3646

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-3620

Trust: 0.5

url:https://access.redhat.com/articles/3553061

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-10675

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-10675

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-14634

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-14634

Trust: 0.4

url:https://access.redhat.com/security/vulnerabilities/mutagen-astronomy

Trust: 0.4

url:https://bugzilla.redhat.com/show_bug.cgi?id=1609664

Trust: 0.3

url:http://www.kernel.org/

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/131

Trust: 0.3

url:https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2018-5142979.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-18344

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-5390

Trust: 0.3

url:https://usn.ubuntu.com/usn/usn-3740-1

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2017-18344

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3741-1

Trust: 0.2

url:https://support.f5.com/csp/article/k74374841?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://github.com/chetanshirke/my_ref

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=58766

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1019.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1021.21

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1019.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1017.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1015.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1020.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-32.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-133.159

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1094.102

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1098.103

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1065.75

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1031.37

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3742-2

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3742-3

Trust: 0.1

url:https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787258

Trust: 0.1

url:https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787127

Trust: 0.1

url:https://access.redhat.com/articles/3674801

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1027.30

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-133.159~14.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3741-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1017.18~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-32.35~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1021.21~16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3740-2

Trust: 0.1

sources: CERT/CC: VU#641765 // VULHUB: VHN-135422 // VULMON: CVE-2018-5391 // BID: 105108 // PACKETSTORM: 148912 // PACKETSTORM: 150312 // PACKETSTORM: 149543 // PACKETSTORM: 148914 // PACKETSTORM: 149832 // PACKETSTORM: 149024 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 149826 // PACKETSTORM: 148916 // PACKETSTORM: 148913 // CNNVD: CNNVD-201808-570 // NVD: CVE-2018-5391

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 150312 // PACKETSTORM: 149543 // PACKETSTORM: 149832 // PACKETSTORM: 149830 // PACKETSTORM: 150191 // PACKETSTORM: 149826

SOURCES

db:CERT/CCid:VU#641765
db:VULHUBid:VHN-135422
db:VULMONid:CVE-2018-5391
db:BIDid:105108
db:PACKETSTORMid:148912
db:PACKETSTORMid:150312
db:PACKETSTORMid:149543
db:PACKETSTORMid:148914
db:PACKETSTORMid:149832
db:PACKETSTORMid:149024
db:PACKETSTORMid:149830
db:PACKETSTORMid:150191
db:PACKETSTORMid:149826
db:PACKETSTORMid:148916
db:PACKETSTORMid:148913
db:CNNVDid:CNNVD-201808-570
db:NVDid:CVE-2018-5391

LAST UPDATE DATE

2025-10-20T02:14:47.950000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#641765date:2018-10-12T00:00:00
db:VULHUBid:VHN-135422date:2022-12-28T00:00:00
db:VULMONid:CVE-2018-5391date:2023-11-07T00:00:00
db:BIDid:105108date:2019-02-15T14:00:00
db:CNNVDid:CNNVD-201808-570date:2022-12-29T00:00:00
db:NVDid:CVE-2018-5391date:2024-11-21T04:08:43.897

SOURCES RELEASE DATE

db:CERT/CCid:VU#641765date:2018-08-14T00:00:00
db:VULHUBid:VHN-135422date:2018-09-06T00:00:00
db:VULMONid:CVE-2018-5391date:2018-09-06T00:00:00
db:BIDid:105108date:2018-08-14T00:00:00
db:PACKETSTORMid:148912date:2018-08-15T04:42:35
db:PACKETSTORMid:150312date:2018-11-13T18:04:13
db:PACKETSTORMid:149543date:2018-09-25T23:02:25
db:PACKETSTORMid:148914date:2018-08-15T04:42:46
db:PACKETSTORMid:149832date:2018-10-17T15:42:22
db:PACKETSTORMid:149024date:2018-08-21T20:20:00
db:PACKETSTORMid:149830date:2018-10-17T15:42:07
db:PACKETSTORMid:150191date:2018-11-06T21:04:13
db:PACKETSTORMid:149826date:2018-10-17T15:40:19
db:PACKETSTORMid:148916date:2018-08-15T04:42:57
db:PACKETSTORMid:148913date:2018-08-15T04:42:40
db:CNNVDid:CNNVD-201808-570date:2018-08-20T00:00:00
db:NVDid:CVE-2018-5391date:2018-09-06T21:29:00.363