Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2017-8824 CVE-2017-9725 CVE-2017-13166 CVE-2017-15265 CVE-2017-17449 CVE-2017-18017 CVE-2017-1000252 CVE-2017-1000410 |
CWE-ID | CWE-416 CWE-789 CWE-264 CWE-200 CWE-617 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions Operating systems & Components / Operating system package or component Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions Operating systems & Components / Operating system package or component kernel (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Enterprise Linux Server - TUS Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, little endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, big endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server - AUS Operating systems & Components / Operating system Red Hat Enterprise Linux Server - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux EUS Compute Node Operating systems & Components / Operating system Other |
Vendor |
Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU9767
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2017-8824
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the target system.
The weakness exists due to an error in the dccp_disconnect function in net/dccp/proto.c in the Linux kernel. A local attacker can make specially crafted AF_UNSPEC connect system call during the DCCP_LISTEN state, trigger use-after-free error and gain root privileges or cause the system to crash.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU12262
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-9725
CWE-ID:
CWE-789 - Uncontrolled Memory Allocation
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to case DoS condition or gain elevated privileges on the target system.
The weakness exists in all Qualcomm products with Android releases from CAF during DMA allocation due to wrong data type of size allocation size gets truncated which makes allocation succeed when it should fail. A local attacker can cause the service to crash or gain root privileges.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10345
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-13166
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in the V4L2 video driver component of the Google Android kernel due to insufficient validation of user-supplied input. A local attacker can use a specially crafted application and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU8816
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-15265
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to use-after-free error in the ALSA sequencer interface (/dev/snd/seq). A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9769
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-17449
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to the __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace. A local attacker can leverage the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink
activity on the system and read arbitrary files.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10678
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-18017
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition no the target system.
The weakness exists in the tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel due to use-after-free error. A remote attacker can leverage the presence of xt_TCPMSS in an iptables action, trigger memory corruption and cause the system to crash.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU8695
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-1000252
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9774
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-1000410
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw when processing the incoming of L2CAP commands, ConfigRequest and ConfigResponse messages. A remote attacker can manipulate the code flows that precede the handling of the configuration messages and read important data.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7
Red Hat Enterprise Linux EUS Compute Node: 7.4
:
CPE2.3https://access.redhat.com/errata/RHSA-2018:1130
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.