Lucene search

K
nvd[email protected]NVD:CVE-2017-7273
HistoryMar 27, 2017 - 5:59 p.m.

CVE-2017-7273

2017-03-2717:59:01
web.nvd.nist.gov
2

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.6 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.9%

The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.

Affected configurations

NVD
Node
linuxlinux_kernelMatch4.0
OR
linuxlinux_kernelMatch4.0.0
OR
linuxlinux_kernelMatch4.0.2
OR
linuxlinux_kernelMatch4.0.3
OR
linuxlinux_kernelMatch4.0.4
OR
linuxlinux_kernelMatch4.0.5
OR
linuxlinux_kernelMatch4.0.6
OR
linuxlinux_kernelMatch4.0.7
OR
linuxlinux_kernelMatch4.0.8
OR
linuxlinux_kernelMatch4.0.9
OR
linuxlinux_kernelMatch4.1.0
OR
linuxlinux_kernelMatch4.1.2
OR
linuxlinux_kernelMatch4.1.3
OR
linuxlinux_kernelMatch4.1.4
OR
linuxlinux_kernelMatch4.1.5
OR
linuxlinux_kernelMatch4.1.6
OR
linuxlinux_kernelMatch4.1.7
OR
linuxlinux_kernelMatch4.1.8
OR
linuxlinux_kernelMatch4.1.9
OR
linuxlinux_kernelMatch4.1.10
OR
linuxlinux_kernelMatch4.1.11
OR
linuxlinux_kernelMatch4.1.12
OR
linuxlinux_kernelMatch4.1.13
OR
linuxlinux_kernelMatch4.1.14
OR
linuxlinux_kernelMatch4.1.15
OR
linuxlinux_kernelMatch4.1.16
OR
linuxlinux_kernelMatch4.1.17
OR
linuxlinux_kernelMatch4.1.18
OR
linuxlinux_kernelMatch4.1.19
OR
linuxlinux_kernelMatch4.1.20
OR
linuxlinux_kernelMatch4.1.21
OR
linuxlinux_kernelMatch4.1.22
OR
linuxlinux_kernelMatch4.1.23
OR
linuxlinux_kernelMatch4.1.33
OR
linuxlinux_kernelMatch4.2.0
OR
linuxlinux_kernelMatch4.2.1
OR
linuxlinux_kernelMatch4.2.2
OR
linuxlinux_kernelMatch4.2.3
OR
linuxlinux_kernelMatch4.2.4
OR
linuxlinux_kernelMatch4.2.5
OR
linuxlinux_kernelMatch4.2.7
OR
linuxlinux_kernelMatch4.2.8
OR
linuxlinux_kernelMatch4.3rc7
OR
linuxlinux_kernelMatch4.3.0
OR
linuxlinux_kernelMatch4.3.1
OR
linuxlinux_kernelMatch4.3.2
OR
linuxlinux_kernelMatch4.3.3
OR
linuxlinux_kernelMatch4.3.5
OR
linuxlinux_kernelMatch4.3.6
OR
linuxlinux_kernelMatch4.4rc8
OR
linuxlinux_kernelMatch4.4.0
OR
linuxlinux_kernelMatch4.4.1
OR
linuxlinux_kernelMatch4.4.2
OR
linuxlinux_kernelMatch4.4.3
OR
linuxlinux_kernelMatch4.4.4
OR
linuxlinux_kernelMatch4.4.5
OR
linuxlinux_kernelMatch4.4.6
OR
linuxlinux_kernelMatch4.4.7
OR
linuxlinux_kernelMatch4.4.8
OR
linuxlinux_kernelMatch4.4.9
OR
linuxlinux_kernelMatch4.4.22
OR
linuxlinux_kernelMatch4.4.23
OR
linuxlinux_kernelMatch4.4.24
OR
linuxlinux_kernelMatch4.4.25
OR
linuxlinux_kernelMatch4.4.26
OR
linuxlinux_kernelMatch4.4.27
OR
linuxlinux_kernelMatch4.4.28
OR
linuxlinux_kernelMatch4.4.32
OR
linuxlinux_kernelMatch4.5.0
OR
linuxlinux_kernelMatch4.5.0rc7
OR
linuxlinux_kernelMatch4.5.1
OR
linuxlinux_kernelMatch4.5.2
OR
linuxlinux_kernelMatch4.5.3
OR
linuxlinux_kernelMatch4.5.4
OR
linuxlinux_kernelMatch4.5.5
OR
linuxlinux_kernelMatch4.5.7
OR
linuxlinux_kernelMatch4.6
OR
linuxlinux_kernelMatch4.6.2
OR
linuxlinux_kernelMatch4.6.3
OR
linuxlinux_kernelMatch4.6.4
OR
linuxlinux_kernelMatch4.6.5
OR
linuxlinux_kernelMatch4.6.6
OR
linuxlinux_kernelMatch4.6.7
OR
linuxlinux_kernelMatch4.7
OR
linuxlinux_kernelMatch4.7rc6
OR
linuxlinux_kernelMatch4.7.4
OR
linuxlinux_kernelMatch4.7.6
OR
linuxlinux_kernelMatch4.8
OR
linuxlinux_kernelMatch4.8.1
OR
linuxlinux_kernelMatch4.8.2
OR
linuxlinux_kernelMatch4.8.3
OR
linuxlinux_kernelMatch4.8.4
OR
linuxlinux_kernelMatch4.8.5
OR
linuxlinux_kernelMatch4.8.6
OR
linuxlinux_kernelMatch4.8.7
OR
linuxlinux_kernelMatch4.8.8
OR
linuxlinux_kernelMatch4.8.9
OR
linuxlinux_kernelMatch4.8.10
OR
linuxlinux_kernelMatch4.8.11
OR
linuxlinux_kernelMatch4.8.12
OR
linuxlinux_kernelMatch4.8.14
OR
linuxlinux_kernelMatch4.8.16
OR
linuxlinux_kernelMatch4.8.17
OR
linuxlinux_kernelMatch4.9.1
OR
linuxlinux_kernelMatch4.9.2
OR
linuxlinux_kernelMatch4.9.3
OR
linuxlinux_kernelMatch4.10
OR
linuxlinux_kernelMatch4.10.1
OR
linuxlinux_kernelMatch4.10.2
OR
linuxlinux_kernelMatch4.10.4

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.6 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.9%