Your submission was sent successfully! Close

CVE-2018-15173

Published: 8 August 2018

Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
nmap
Launchpad, Ubuntu, Debian
bionic Needed

cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Ignored
(reached end-of-life)
focal Not vulnerable
(7.80+dfsg1-2build1)
groovy Not vulnerable
(7.80+dfsg1-2build1)
hirsute Not vulnerable
(7.80+dfsg1-2build1)
impish Not vulnerable
(7.80+dfsg1-2build1)
jammy Not vulnerable
(7.80+dfsg1-2build1)
precise Ignored
(end of ESM support, was needs-triage)
trusty Needs triage

upstream
Released (7.80)
xenial Needs triage

Patches:
upstream: https://github.com/nmap/nmap/commit/6d8bb6df229f7acf768bcebfe14cdc8c3dbbe92b