CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
22.7%
libffi requests an executable stack allowing attackers to more easily
trigger arbitrary code execution by overwriting the stack. Please note that
libffi is used by a number of other libraries. It was previously stated
that this affects libffi version 3.2.1 but this appears to be incorrect.
libffi prior to version 3.1 on 32 bit x86 systems was vulnerable, and
upstream is believed to have fixed this issue in version 3.1.
access.redhat.com/security/cve/CVE-2017-1000376
launchpad.net/bugs/cve/CVE-2017-1000376
nvd.nist.gov/vuln/detail/CVE-2017-1000376
security-tracker.debian.org/tracker/CVE-2017-1000376
ubuntu.com/security/notices/USN-3454-1
ubuntu.com/security/notices/USN-3454-2
www.cve.org/CVERecord?id=CVE-2017-1000376
www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
22.7%