7.8

CVE-2017-7184

Media report

The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version4.8
   CanonicalUbuntu Linux Version16.10
LinuxLinux Kernel Version < 3.2.89
LinuxLinux Kernel Version >= 3.3 < 3.10.106
LinuxLinux Kernel Version >= 3.11 < 3.12.73
LinuxLinux Kernel Version >= 3.13 < 3.16.44
LinuxLinux Kernel Version >= 3.17 < 3.18.49
LinuxLinux Kernel Version >= 3.19 < 4.1.49
LinuxLinux Kernel Version >= 4.2 < 4.4.59
LinuxLinux Kernel Version >= 4.5 < 4.9.20
LinuxLinux Kernel Version >= 4.10 < 4.10.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.36% 0.843
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
http://openwall.com/lists/oss-security/2017/03/29/2
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/97018
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038166
Third Party Advisory
VDB Entry
https://blog.trendmicro.com/results-pwn2own-2017-day-one/
Third Party Advisory
Technical Description
https://twitter.com/thezdi/status/842126074435665920
Third Party Advisory
Press/Media Coverage