Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-1000371 | First vendor Publication | 2017-06-19 |
Vendor | Cve | Last vendor Modification | 2023-01-17 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.8 | ||
Base Score | 7.8 | Environmental Score | 7.8 |
impact SubScore | 5.9 | Temporal Score | 7.8 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371 |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-11-16 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1245.nasl - Type : ACT_GATHER_INFO |
2017-10-23 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa_10826.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3981.nasl - Type : ACT_GATHER_INFO |
2017-07-17 | Name : The remote Fedora host is missing a security update. File : fedora_2017-d3ed702fe4.nasl - Type : ACT_GATHER_INFO |
2017-06-28 | Name : The remote Fedora host is missing a security update. File : fedora_2017-05f10e29f4.nasl - Type : ACT_GATHER_INFO |
2017-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2017-d7bc1b3056.nasl - Type : ACT_GATHER_INFO |
2017-06-20 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-845.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-03-12 12:39:37 |
|
2024-02-02 01:43:01 |
|
2024-02-01 12:12:07 |
|
2023-12-29 01:38:13 |
|
2023-11-22 01:37:53 |
|
2023-09-05 12:41:02 |
|
2023-09-05 01:11:51 |
|
2023-09-02 12:40:50 |
|
2023-09-02 01:12:07 |
|
2023-08-12 12:44:17 |
|
2023-08-12 01:11:37 |
|
2023-08-11 12:38:57 |
|
2023-08-11 01:11:56 |
|
2023-08-06 12:37:40 |
|
2023-08-06 01:11:36 |
|
2023-08-04 12:37:50 |
|
2023-08-04 01:11:40 |
|
2023-07-14 12:37:52 |
|
2023-07-14 01:11:39 |
|
2023-06-06 12:33:11 |
|
2023-03-29 01:39:38 |
|
2023-03-28 12:11:57 |
|
2023-01-25 00:27:51 |
|
2023-01-18 00:27:58 |
|
2021-05-04 12:55:20 |
|
2021-04-22 02:07:49 |
|
2020-05-23 00:54:31 |
|
2019-10-03 09:19:51 |
|
2017-11-17 13:23:44 |
|
2017-11-06 09:22:37 |
|
2017-10-24 13:25:29 |
|
2017-09-22 13:24:45 |
|
2017-08-12 09:23:18 |
|
2017-07-18 13:24:51 |
|
2017-06-29 13:23:35 |
|
2017-06-27 21:18:42 |
|
2017-06-27 13:23:21 |
|
2017-06-21 13:23:53 |
|
2017-06-21 09:23:12 |
|
2017-06-19 21:22:02 |
|