Lucene search

K
nvd[email protected]NVD:CVE-2017-1000253
HistoryOct 05, 2017 - 1:29 a.m.

CVE-2017-1000253

2017-10-0501:29:04
CWE-119
web.nvd.nist.gov
3

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the “gap” between the stack and the binary.

Affected configurations

NVD
Node
centoscentosMatch6.0
OR
centoscentosMatch6.1
OR
centoscentosMatch6.2
OR
centoscentosMatch6.3
OR
centoscentosMatch6.4
OR
centoscentosMatch6.5
OR
centoscentosMatch6.6
OR
centoscentosMatch6.7
OR
centoscentosMatch6.8
OR
centoscentosMatch6.9
OR
centoscentosMatch7.1406
OR
centoscentosMatch7.1503
OR
centoscentosMatch7.1511
OR
centoscentosMatch7.1611
OR
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch6.1
OR
redhatenterprise_linuxMatch6.2
OR
redhatenterprise_linuxMatch6.3
OR
redhatenterprise_linuxMatch6.4
OR
redhatenterprise_linuxMatch6.5
OR
redhatenterprise_linuxMatch6.6
OR
redhatenterprise_linuxMatch6.7
OR
redhatenterprise_linuxMatch6.8
OR
redhatenterprise_linuxMatch6.9
OR
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch7.1
OR
redhatenterprise_linuxMatch7.2
OR
redhatenterprise_linuxMatch7.3
Node
linuxlinux_kernelRange2.6.253.2.70
OR
linuxlinux_kernelRange3.33.4.109
OR
linuxlinux_kernelRange3.53.10.77
OR
linuxlinux_kernelRange3.113.12.43
OR
linuxlinux_kernelRange3.133.14.41
OR
linuxlinux_kernelRange3.153.16.35
OR
linuxlinux_kernelRange3.173.18.14
OR
linuxlinux_kernelRange3.193.19.7
OR
linuxlinux_kernelRange4.04.0.2

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%