CVE-2017-18509 — Improper Input Validation in Kernel
Severity
7.8HIGHNVD
EPSS
0.1%
top 78.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 13
Latest updateMar 14
Description
An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appro…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 10.0, 8.0, 9.0, Ubuntu Linux 16.04
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5💬Community
3Bugzilla▶
CVE-2017-18509 kernel: not checking sk_type and protocol in net/ipv6/ip6mr.c leads to general protection fault, or arbitrary code execution [fedora-all]↗2019-08-21
Bugzilla▶
CVE-2017-18509 kernel: not checking sk_type and protocol in net/ipv6/ip6mr.c leads to general protection fault, or arbitrary code execution [fedora-all]↗2019-08-21
Bugzilla▶
CVE-2017-18509 kernel: not checking sk_type and protocol in net/ipv6/ip6mr.c leads to general protection fault, or arbitrary code execution↗2019-08-20