#VU7245 Out-of-bounds read in Linux kernel - CVE-2017-9074


| Updated: 2017-07-03

Vulnerability identifier: #VU7245

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-9074

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description
The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to the the failure to consider that the nexthdr field may be associated with an invalid option by the IPv6 fragmentation implementation. A local attacker can use a specially-crafted socket or system call to trigger out-of-bounds read and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation
Update to version 4.11.2.

Vulnerable software versions

Linux kernel: 4.0.1 - 4.0.9, 4.1.1 - 4.11.1, 4.2.0 - 4.2.8, 4.3.1 - 4.3.6, 4.4.0 - 4.4.75, 4.5.0 - 4.5.7, 4.6.0 - 4.6.7, 4.7.0 - 4.7.10, 4.8.0 - 4.8.17, 4.9.1 - 4.9.35


External links
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b0...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability