Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-11473

Опубликовано: 18 июл. 2017
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.

Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 4.12.2 allows local users to gain privileges via a crafted ACPI table.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates of the Red Hat products. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. This attack requires

  • An attacker to be able to write to the ACPI tables ( local, privileged operation and non generalized attacks)
  • The ability for the attacker to reboot the system ( local, privileged operation )
  • The ACPI table changes to persist through reboots ( not common on cloud/serverless platforms )
  • This modification to the table alone is able to possibly corrupt memory, but the corruption will not be enough alone, the corrupted affected memory will be overwritten with valid acpi struct data which also has to corrupt the memory in which a way the flaw can create abuse (HARD).
  • The attacker will find it significantly difficult to abuse this a flaw in early-boot as injecting code/controlled execution at this point would require privileges. If an attacker had this specific privilege, there are easier ways to gain privilege escalation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelWill not fix
Red Hat Enterprise Linux 6kernelWill not fix
Red Hat Enterprise Linux 7kernelWill not fix
Red Hat Enterprise Linux 7kernel-rtWill not fix
Red Hat Enterprise MRG 2realtime-kernelWill not fix
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2018:065410.04.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1473209kernel: Buffer overflow in mp_override_legacy_irq()

EPSS

Процентиль: 27%
0.00092
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.

CVSS3: 7.8
nvd
около 8 лет назад

Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.

CVSS3: 7.8
debian
около 8 лет назад

Buffer overflow in the mp_override_legacy_irq() function in arch/x86/k ...

CVSS3: 7.8
github
около 3 лет назад

Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.

CVSS3: 7.8
fstec
около 8 лет назад

Уязвимость функции mp_override_legacy_irq ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 27%
0.00092
Низкий

6.4 Medium

CVSS3