Linux Kernel up to 4.10 Socket Option net/ipv6/ip6mr.c memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
5.3 | $0-$5k |
A vulnerability was found in Linux Kernel up to 4.10 (Operating System) and classified as critical. This issue affects an unknown code block of the file net/ipv6/ip6mr.c of the component Socket Option Handler. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. Impacted is confidentiality, integrity, and availability.
The weakness was published 08/13/2019. The identification of this vulnerability is CVE-2017-18509 since 08/13/2019. The successful exploitation requires a single authentication. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/14/2019).
Upgrading to version 4.11 eliminates this vulnerability.
Type
Vendor
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔒
VulDB Reliability: 🔍
AV AC Au C I A 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 🔍 Vector Complexity Authentication Confidentiality Integrity Availability unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Memory corruption (CWE-119)
Local: Yes
Remote: No
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒0-Day unlock unlock unlock unlock Today unlock unlock unlock unlock
Threat Intelligence
Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Upgrade: Kernel 4.11
08/13/2019 Advisory disclosed
08/13/2019 CVE assigned
08/14/2019 VulDB entry created
08/14/2019 VulDB last updateVendor: kernel.org
CVE: CVE-2017-18509 (🔒)Created: 08/14/2019 01:58 PM
Complete: 🔍
Comments
See the underground prices here!
https://vuldb.com/?id.139865
Leave a Reply
You must be logged in to post a comment.
No comments yet. Please log in to comment.