SNS: Bad handling of non-contiguous network buffers

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2019-017 CVE-2019-5611 08/20/2019 medium v2

Vulnerability details

The kernel store network packet into buffers and those buffers can be fragmented and non-contiguous. A lack of checks in the kernel before manipulating the buffers can lead to a denial of service.

Impacted products

ProductsSeverityDetail
Stormshield Network Security medium CVE-2019-5611

Revisions

Version Date Description
v1  08/20/2019 Initial release
v2 10/07/2019 Add SNS 2.x fix versions

 



Stormshield Network Security

CVSS v2 Overall Score: 5.8      

Analysis

Impacted version

The kernel store network packet into buffers and those buffers can be fragmented and non-contiguous. A lack of checks in the kernel before manipulating the buffers can lead to a denial of service.

  • SNS 2.X
  • SNS 3.X

Workaround solution

Solution

There is no workaround solution.

The SNS 2.7.5, 2.15.0, 3.7.7 and 3.9.1 updates will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None None None Complete
CVSS Base score: 7.8 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 5.8 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 5.8 CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)