CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
51.5%
The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux
kernel through 4.10.6 does not validate certain size data after an
XFRM_MSG_NEWAE update, which allows local users to obtain root privileges
or cause a denial of service (heap-based out-of-bounds access) by
leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own
competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package
4.8.0.41.52.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | linux | < 3.2.0-125.168 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-115.162 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-71.92 | UNKNOWN |
ubuntu | 16.10 | noarch | linux | < 4.8.0-45.48 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-armadaxp | < 3.2.0-1686.113 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1012.21 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gke | < 4.4.0-1009.9 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.8.0-45.48~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe-edge | < 4.8.0-45.48~16.04.1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | < 3.13.0-115.162~precise1 | UNKNOWN |
www.eweek.com/security/ubuntu-linux-falls-on-day-1-of-pwn2own-hacking-competition
blog.trendmicro.com/results-pwn2own-2017-day-one/
git.kernel.org/linus/677e806da4d916052585301785d847c3b3e6186a
git.kernel.org/linus/f843ee6dd019bcece3e74e76ad9df0155655d0df
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=52b9c816807abd46c285cd8ab183fe93194bfb3f
launchpad.net/bugs/cve/CVE-2017-7184
nvd.nist.gov/vuln/detail/CVE-2017-7184
security-tracker.debian.org/tracker/CVE-2017-7184
twitter.com/thezdi/status/842126074435665920
ubuntu.com/security/notices/USN-3248-1
ubuntu.com/security/notices/USN-3249-1
ubuntu.com/security/notices/USN-3249-2
ubuntu.com/security/notices/USN-3250-1
ubuntu.com/security/notices/USN-3250-2
ubuntu.com/security/notices/USN-3251-1
ubuntu.com/security/notices/USN-3251-2
www.cve.org/CVERecord?id=CVE-2017-7184
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
51.5%