Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-2922

Опубликовано: 07 нояб. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

РелизСтатусПримечание
artful

not-affected

windows only
devel

not-affected

windows only
esm-apps/xenial

not-affected

windows only
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [windows only]]
precise/esm

DNE

trusty

not-affected

windows only
trusty/esm

DNE

trusty was not-affected [windows only]
upstream

needs-triage

xenial

not-affected

windows only
zesty

not-affected

windows only

Показывать по

EPSS

Процентиль: 86%
0.02712
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 8 лет назад

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

CVSS3: 9.8
debian
около 8 лет назад

An exploitable memory corruption vulnerability exists in the Websocket ...

CVSS3: 9.8
github
больше 3 лет назад

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

EPSS

Процентиль: 86%
0.02712
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3