SNS: Bad handling of non-contiguous network buffers
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2019-017 | CVE-2019-5611 | 08/20/2019 | medium | v2 |
Vulnerability details
The kernel store network packet into buffers and those buffers can be fragmented and non-contiguous. A lack of checks in the kernel before manipulating the buffers can lead to a denial of service.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | medium | CVE-2019-5611 |
Revisions
Version | Date | Description |
---|---|---|
v1 | 08/20/2019 | Initial release |
v2 | 10/07/2019 | Add SNS 2.x fix versions |

Stormshield Network Security |
CVSS v2 Overall Score: 5.8
|
Analysis |
Impacted version |
The kernel store network packet into buffers and those buffers can be fragmented and non-contiguous. A lack of checks in the kernel before manipulating the buffers can lead to a denial of service. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The SNS 2.7.5, 2.15.0, 3.7.7 and 3.9.1 updates will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | None | None | Complete |
CVSS Base score: 7.8 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 5.8 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 5.8 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |
