Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9074

Опубликовано: 19 мая 2017
Источник: debian
EPSS Низкий

Описание

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.9.30-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/2423496af35d94a87156b063ea5cedffc10a70a1

EPSS

Процентиль: 23%
0.00074
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

CVSS3: 5.5
redhat
около 8 лет назад

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

CVSS3: 7.8
nvd
около 8 лет назад

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

CVSS3: 7.8
github
около 3 лет назад

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

CVSS3: 7.3
fstec
около 8 лет назад

Уязвимость реализации фрагментации пакетов IPv6 в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

EPSS

Процентиль: 23%
0.00074
Низкий