4.3
CVSSv3

CVE-2018-10932

Published: 21/08/2018 Updated: 12/02/2023
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 294
Vector: AV:A/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an malicious user to inject shell control characters into the buffer and impact the behavior of the terminal.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel lldptool

Vendor Advisories

Synopsis Low: lldpad security and bug fix update Type/Severity Security Advisory: Low Topic An update for lldpad is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which g ...
Debian Bug report logs - #905901 lldpad: CVE-2018-10932: improper sanitization of shell-escape codes Package: src:lldpad; Maintainer for src:lldpad is Debian FCoE Maintainers <team+fcoe@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 11 Aug 2018 12:06:02 UTC Severity: important T ...
lldptool can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal (CVE-2018-10932) ...
lldptool can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal ...