Lucene search

K
cve[email protected]CVE-2017-17741
HistoryDec 18, 2017 - 8:29 a.m.

CVE-2017-17741

2017-12-1808:29:00
CWE-125
web.nvd.nist.gov
157
cve-2017-17741
kvm
linux kernel
security vulnerability
sensitive information
memory
out-of-bounds read
nvd

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

26.4%

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

Affected configurations

NVD
Node
linuxlinux_kernelRange4.14.7
Node
debiandebian_linuxMatch9.0
VendorProductVersionCPE
linuxlinux_kernelcpe:/o:linux:linux_kernel::::

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

26.4%