Lucene search

K
cveMitreCVE-2017-7273
HistoryMar 27, 2017 - 5:59 p.m.

CVE-2017-7273

2017-03-2717:59:01
mitre
web.nvd.nist.gov
169
linux kernel
hid-cypress.c
cp_report_fixup
dos
cve-2017-7273
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

6.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

26.7%

The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.

Affected configurations

Nvd
Node
linuxlinux_kernelMatch4.0
OR
linuxlinux_kernelMatch4.0.0
OR
linuxlinux_kernelMatch4.0.2
OR
linuxlinux_kernelMatch4.0.3
OR
linuxlinux_kernelMatch4.0.4
OR
linuxlinux_kernelMatch4.0.5
OR
linuxlinux_kernelMatch4.0.6
OR
linuxlinux_kernelMatch4.0.7
OR
linuxlinux_kernelMatch4.0.8
OR
linuxlinux_kernelMatch4.0.9
OR
linuxlinux_kernelMatch4.1.0
OR
linuxlinux_kernelMatch4.1.2
OR
linuxlinux_kernelMatch4.1.3
OR
linuxlinux_kernelMatch4.1.4
OR
linuxlinux_kernelMatch4.1.5
OR
linuxlinux_kernelMatch4.1.6
OR
linuxlinux_kernelMatch4.1.7
OR
linuxlinux_kernelMatch4.1.8
OR
linuxlinux_kernelMatch4.1.9
OR
linuxlinux_kernelMatch4.1.10
OR
linuxlinux_kernelMatch4.1.11
OR
linuxlinux_kernelMatch4.1.12
OR
linuxlinux_kernelMatch4.1.13
OR
linuxlinux_kernelMatch4.1.14
OR
linuxlinux_kernelMatch4.1.15
OR
linuxlinux_kernelMatch4.1.16
OR
linuxlinux_kernelMatch4.1.17
OR
linuxlinux_kernelMatch4.1.18
OR
linuxlinux_kernelMatch4.1.19
OR
linuxlinux_kernelMatch4.1.20
OR
linuxlinux_kernelMatch4.1.21
OR
linuxlinux_kernelMatch4.1.22
OR
linuxlinux_kernelMatch4.1.23
OR
linuxlinux_kernelMatch4.1.33
OR
linuxlinux_kernelMatch4.2.0
OR
linuxlinux_kernelMatch4.2.1
OR
linuxlinux_kernelMatch4.2.2
OR
linuxlinux_kernelMatch4.2.3
OR
linuxlinux_kernelMatch4.2.4
OR
linuxlinux_kernelMatch4.2.5
OR
linuxlinux_kernelMatch4.2.7
OR
linuxlinux_kernelMatch4.2.8
OR
linuxlinux_kernelMatch4.3rc7
OR
linuxlinux_kernelMatch4.3.0
OR
linuxlinux_kernelMatch4.3.1
OR
linuxlinux_kernelMatch4.3.2
OR
linuxlinux_kernelMatch4.3.3
OR
linuxlinux_kernelMatch4.3.5
OR
linuxlinux_kernelMatch4.3.6
OR
linuxlinux_kernelMatch4.4rc8
OR
linuxlinux_kernelMatch4.4.0
OR
linuxlinux_kernelMatch4.4.1
OR
linuxlinux_kernelMatch4.4.2
OR
linuxlinux_kernelMatch4.4.3
OR
linuxlinux_kernelMatch4.4.4
OR
linuxlinux_kernelMatch4.4.5
OR
linuxlinux_kernelMatch4.4.6
OR
linuxlinux_kernelMatch4.4.7
OR
linuxlinux_kernelMatch4.4.8
OR
linuxlinux_kernelMatch4.4.9
OR
linuxlinux_kernelMatch4.4.22
OR
linuxlinux_kernelMatch4.4.23
OR
linuxlinux_kernelMatch4.4.24
OR
linuxlinux_kernelMatch4.4.25
OR
linuxlinux_kernelMatch4.4.26
OR
linuxlinux_kernelMatch4.4.27
OR
linuxlinux_kernelMatch4.4.28
OR
linuxlinux_kernelMatch4.4.32
OR
linuxlinux_kernelMatch4.5.0
OR
linuxlinux_kernelMatch4.5.0rc7
OR
linuxlinux_kernelMatch4.5.1
OR
linuxlinux_kernelMatch4.5.2
OR
linuxlinux_kernelMatch4.5.3
OR
linuxlinux_kernelMatch4.5.4
OR
linuxlinux_kernelMatch4.5.5
OR
linuxlinux_kernelMatch4.5.7
OR
linuxlinux_kernelMatch4.6
OR
linuxlinux_kernelMatch4.6.2
OR
linuxlinux_kernelMatch4.6.3
OR
linuxlinux_kernelMatch4.6.4
OR
linuxlinux_kernelMatch4.6.5
OR
linuxlinux_kernelMatch4.6.6
OR
linuxlinux_kernelMatch4.6.7
OR
linuxlinux_kernelMatch4.7
OR
linuxlinux_kernelMatch4.7rc6
OR
linuxlinux_kernelMatch4.7.4
OR
linuxlinux_kernelMatch4.7.6
OR
linuxlinux_kernelMatch4.8
OR
linuxlinux_kernelMatch4.8.1
OR
linuxlinux_kernelMatch4.8.2
OR
linuxlinux_kernelMatch4.8.3
OR
linuxlinux_kernelMatch4.8.4
OR
linuxlinux_kernelMatch4.8.5
OR
linuxlinux_kernelMatch4.8.6
OR
linuxlinux_kernelMatch4.8.7
OR
linuxlinux_kernelMatch4.8.8
OR
linuxlinux_kernelMatch4.8.9
OR
linuxlinux_kernelMatch4.8.10
OR
linuxlinux_kernelMatch4.8.11
OR
linuxlinux_kernelMatch4.8.12
OR
linuxlinux_kernelMatch4.8.14
OR
linuxlinux_kernelMatch4.8.16
OR
linuxlinux_kernelMatch4.8.17
OR
linuxlinux_kernelMatch4.9.1
OR
linuxlinux_kernelMatch4.9.2
OR
linuxlinux_kernelMatch4.9.3
OR
linuxlinux_kernelMatch4.10
OR
linuxlinux_kernelMatch4.10.1
OR
linuxlinux_kernelMatch4.10.2
OR
linuxlinux_kernelMatch4.10.4
VendorProductVersionCPE
linuxlinux_kernel4.0cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*
linuxlinux_kernel4.0.0cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*
linuxlinux_kernel4.0.2cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*
linuxlinux_kernel4.0.3cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*
linuxlinux_kernel4.0.4cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*
linuxlinux_kernel4.0.5cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*
linuxlinux_kernel4.0.6cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*
linuxlinux_kernel4.0.7cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*
linuxlinux_kernel4.0.8cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*
linuxlinux_kernel4.0.9cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 1101

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

6.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

26.7%