• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Antivirus For Linux • Antivirus For Server • Education • Endpoint Security  /  CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel
27 May 2019

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Written by ganesh lakariya
ganesh lakariya
Antivirus For Linux, Antivirus For Server, Education, Endpoint Security

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all.

This flaw could enable an attacker to compromise a system and vulnerability could be exploited by any remote attacker. They could do this with no privilege requirement over the network. There is no user interaction also required.

An attacker could exploit the following vulnerabilities:

  • Allow unauthorized disclosure of information
  • Allow unauthorized modification
  • Allow disruption of service

These could trigger a DOS (Denial of Service) condition.

The vulnerability tracked as CVE-2019-11815 could lead to privilege escalation vulnerability. The vulnerability only affects Linux kernels prior to 5.0.8, that use the Reliable Datagram Sockets (RDS) for the TCP module

“According to security experts a system that has the rds_tcp kernel module loaded either manually or automatically by a local process, could potentially allow an attacker to manipulate the socket state based on a Use-After-Free (UAF) condition, trigger the memory corruption and privilege escalation on the target system”, reads the security advisory published by the NIST.

Previous similar vulnerabilities:

  1. MiTM vulnerabilities leading to code execution patched in APT
    In January, there was a flaw related with code execution impacting the APT high-level package manager. This vulnerability was described as a ‘content injection in http method’ and it was tracked as CVE-2019-3462 which leads to man in the middle attack. An attacker could execute code with the root privileges on the victim’s system.

2. Similar kind of issue was discovered by Google Project Zero’s Jann Horn in December 2016, which later
patched.

What should you do?

The problem has been patched in version 5.0.8 of the Linux kernel so, users can upgrade to a later kernel version.

If you can’t upgrade, or if you don’t want to deal with kernel compilations and dependencies, you may blacklist the “rds.ko” module.

Note: Right now, there have been no known cases of exploitation and the security experts consider this vulnerability to be very complicated to exploit but, admins or users should upgrade their Linux kernel version is the only preventive step.

 

Reference:

https://nvd.nist.gov/vuln/detail/CVE-2019-11815

https://access.redhat.com/security/cve/cve-2019-11815

 

Analysis by:

Swapnil Nigade and Ganesh Lakariya (Security Labs-QA)

 Previous PostSeqrite Endpoint Security supports the Windows 10 May 2019 Update
Next Post  Rise of cyber-physical attacks
ganesh lakariya

About ganesh lakariya

Ganesh Lakariya is a technical lead in Quality Assurance department at Security Labs. He has 13+ years of experience in security domain & is excellent in...

Articles by Ganesh Lakariya »

Related Posts

  • EDR vs XDR: Understanding the Differences and Choosing the Right Solution

    April 9, 2025
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
  • Difference between EDR and antivirus

    Beyond the Basics: EDR vs. Antivirus and What You Need to Know

    August 26, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies