7.8
CVE-2017-1000365
- EPSS 0.08%
- Published 19.06.2017 16:29:00
- Last modified 20.04.2025 01:37:25
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 2.6.23 < 3.2.91
Linux ≫ Linux Kernel Version >= 3.3 < 3.10.108
Linux ≫ Linux Kernel Version >= 3.11 < 3.16.46
Linux ≫ Linux Kernel Version >= 3.17 < 3.18.59
Linux ≫ Linux Kernel Version >= 3.19 < 4.1.43
Linux ≫ Linux Kernel Version >= 4.2 < 4.4.75
Linux ≫ Linux Kernel Version >= 4.5 < 4.9.35
Linux ≫ Linux Kernel Version >= 4.10 < 4.11.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.248 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|