← Volver a CVEs
CVE-2019-3846
HIGH8.8
Descripcion
A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueADJACENT_NETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/3/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoralinux:linux_kernelnetapp:a700snetapp:a700s_firmwarenetapp:active_iq_unified_manager_for_vmware_vspherenetapp:cn1610netapp:cn1610_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:hci_management_nodenetapp:solidfireopensuse:leapredhat:enterprise_linux
Debilidades (CWE)
CWE-122CWE-787
Referencias
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html(secalert@redhat.com)
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2703(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2741(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3055(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3076(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:3089(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2020:0174(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Jul/33(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Jun/26(secalert@redhat.com)
https://seclists.org/oss-sec/2019/q2/133(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20190710-0002/(secalert@redhat.com)
https://usn.ubuntu.com/4093-1/(secalert@redhat.com)
https://usn.ubuntu.com/4094-1/(secalert@redhat.com)
https://usn.ubuntu.com/4095-1/(secalert@redhat.com)
https://usn.ubuntu.com/4095-2/(secalert@redhat.com)
https://usn.ubuntu.com/4117-1/(secalert@redhat.com)
https://usn.ubuntu.com/4118-1/(secalert@redhat.com)
https://www.debian.org/security/2019/dsa-4465(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2703(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2741(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3055(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3076(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3089(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0174(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jul/33(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jun/26(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/oss-sec/2019/q2/133(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190710-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4093-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4094-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4095-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4117-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4118-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4465(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.