Description
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1531-1 | linux-4.9 security update |
Debian DSA |
DSA-4308-1 | linux security update |
EUVD |
EUVD-2018-6536 | A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. |
Ubuntu USN |
USN-3775-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3775-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3776-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3776-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3777-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3777-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3777-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-3779-1 | Linux kernel vulnerabilities |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Eus
Subscribe
Rhel Extras Rt
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T09:38:13.035Z
Reserved: 2018-07-27T00:00:00.000Z
Link: CVE-2018-14633
No data.
Status : Modified
Published: 2018-09-25T00:29:00.357
Modified: 2024-11-21T03:49:28.320
Link: CVE-2018-14633
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN