Linux Kernel up to 5.0.14 sock.c do_hidp_sock_ioctl command injection

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.2 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Linux Kernel up to 5.0.14. It has been declared as problematic. This vulnerability affects the function do_hidp_sock_ioctl of the file net/bluetooth/hidp/sock.c. Such manipulation leads to command injection.
This vulnerability is listed as CVE-2019-11884. The attack must be carried out locally. There is no available exploit.
It is recommended to upgrade the affected component.
Details
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.0.14 (Operating System). Affected by this issue is the function do_hidp_sock_ioctl of the file net/bluetooth/hidp/sock.c. The manipulation with an unknown input leads to a command injection vulnerability. Using CWE to declare the problem leads to CWE-77. The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Impacted is confidentiality. CVE summarizes:
The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
The bug was discovered 04/23/2019. The weakness was presented 05/10/2019 (Website). The advisory is shared for download at securityfocus.com. This vulnerability is handled as CVE-2019-11884 since 05/10/2019. The attack needs to be approached locally. Required for exploitation is a simple authentication. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1202.
The vulnerability was handled as a non-public zero-day exploit for at least 17 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 208605 (CentOS 7 : kernel-alt (RHSA-2020:0740)), which helps to determine the existence of the flaw in a target environment. The commercial vulnerability scanner Qualys is able to test this issue with plugin 172398 (OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2019:1407-1)).
Upgrading to version 5.0.15 eliminates this vulnerability.
The vulnerability is also documented in the databases at Tenable (208605) and SecurityFocus (BID 105388†). See VDB-124429, VDB-127125, VDB-133998 and VDB-134452 for similar entries. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.3VulDB Meta Temp Score: 3.2
VulDB Base Score: 3.3
VulDB Temp Score: 3.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 3.3
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Command injectionCWE: CWE-77 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 208605
Nessus Name: CentOS 7 : kernel-alt (RHSA-2020:0740)
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Kernel 5.0.15
Patch: git.kernel.org
Timeline
09/24/2018 🔍04/23/2019 🔍
05/10/2019 🔍
05/10/2019 🔍
05/11/2019 🔍
10/14/2024 🔍
Sources
Vendor: kernel.orgAdvisory: RHSA-2019:3309⛔
Status: Confirmed
CVE: CVE-2019-11884 (🔍)
GCVE (CVE): GCVE-0-2019-11884
GCVE (VulDB): GCVE-100-134588
SecurityFocus: 105388 - Linux Kernel 'chap_server_compute_md5()' Function Stack Buffer Overflow Vulnerability
See also: 🔍
Entry
Created: 05/11/2019 17:55Updated: 10/14/2024 07:27
Changes: 05/11/2019 17:55 (64), 06/08/2020 22:10 (4), 09/15/2023 14:56 (4), 10/14/2024 07:27 (17)
Complete: 🔍
Cache ID: 216::103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.