SB2019102510 - Stack-based buffer overflow in nmap (Alpine package)
Published: October 25, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2018-15173)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to stack-based buffer overflow when the -sV option is used. A remote unauthenticated attacker can supply a specially crafted TCP-based service, trigger memory corruption and cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=c6bb37d9b3b97ad919485aa1bdc99206d3f41a5b
- https://git.alpinelinux.org/aports/commit/?id=84ef17ea9337f2176dcaa62288903906ef70a035
- https://git.alpinelinux.org/aports/commit/?id=2c2f9f27c8ac931989d3a5975e6f7356494150f0
- https://git.alpinelinux.org/aports/commit/?id=43fb559906f0919b32280ff71a52a535f7158e3c
- https://git.alpinelinux.org/aports/commit/?id=ddbe1950281feebd3fb30c7057104c724577c6a8