Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-7184


The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.


Published

2017-03-19T18:59:00.193

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel 4.8 Yes
Operating System canonical ubuntu_linux 16.10 No
Operating System linux linux_kernel < 3.2.89 Yes
Operating System linux linux_kernel < 3.10.106 Yes
Operating System linux linux_kernel < 3.12.73 Yes
Operating System linux linux_kernel < 3.16.44 Yes
Operating System linux linux_kernel < 3.18.49 Yes
Operating System linux linux_kernel < 4.1.49 Yes
Operating System linux linux_kernel < 4.4.59 Yes
Operating System linux linux_kernel < 4.9.20 Yes
Operating System linux linux_kernel < 4.10.8 Yes

References