lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2019:3673 | |
| https://bugzilla.redhat.com/show_bug.cgi?id=1551623 | Issue Tracking Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10932 | Issue Tracking Third Party Advisory |
| https://github.com/intel/openlldp/pull/7 | Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2019:3673 | |
| https://bugzilla.redhat.com/show_bug.cgi?id=1551623 | Issue Tracking Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10932 | Issue Tracking Third Party Advisory |
| https://github.com/intel/openlldp/pull/7 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-08-21 18:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10932
Mitre link : CVE-2018-10932
CVE.ORG link : CVE-2018-10932
JSON object : View
Products Affected
intel
- lldptool
