FKIE_CVE-2017-17741

Vulnerability from fkie_nvd - Published: 2017-12-18 08:29 - Updated: 2025-04-20 01:37
Summary
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
References
cve@mitre.orghttp://www.securityfocus.com/bid/102227
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
cve@mitre.orghttps://usn.ubuntu.com/3617-1/
cve@mitre.orghttps://usn.ubuntu.com/3617-2/
cve@mitre.orghttps://usn.ubuntu.com/3617-3/
cve@mitre.orghttps://usn.ubuntu.com/3619-1/
cve@mitre.orghttps://usn.ubuntu.com/3619-2/
cve@mitre.orghttps://usn.ubuntu.com/3620-1/
cve@mitre.orghttps://usn.ubuntu.com/3620-2/
cve@mitre.orghttps://usn.ubuntu.com/3632-1/
cve@mitre.orghttps://www.debian.org/security/2017/dsa-4073Issue Tracking, Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2018/dsa-4082
cve@mitre.orghttps://www.spinics.net/lists/kvm/msg160796.htmlIssue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/102227
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3617-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3617-2/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3617-3/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3619-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3619-2/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3620-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3620-2/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3632-1/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2017/dsa-4073Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4082
af854a3a-2127-422b-91ae-364da2661108https://www.spinics.net/lists/kvm/msg160796.htmlIssue Tracking, Patch, Third Party Advisory
Impacted products
Vendor Product Version
linux linux_kernel *
debian debian_linux 9.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCF53DC7-5CFD-4A54-AABC-71D623665F85",
              "versionEndIncluding": "4.14.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n KVM en el kernel de Linux hasta la versi\u00f3n 4.14.7 permite que atacantes remotos obtengan informaci\u00f3n potencialmente sensible de la memoria del kernel. Esto tambi\u00e9n se conoce como una lectura fuera de l\u00edmites basada en pila write_mmio y est\u00e1 relacionado con arch/x86/kvm/x86.c e include/trace/events/kvm.h."
    }
  ],
  "id": "CVE-2017-17741",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-12-18T08:29:00.210",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/102227"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3617-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3617-2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3617-3/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3619-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3619-2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3620-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3620-2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/3632-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-4073"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2018/dsa-4082"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.spinics.net/lists/kvm/msg160796.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/102227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3617-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3617-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3617-3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3619-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3619-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3620-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3620-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/3632-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-4073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2018/dsa-4082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.spinics.net/lists/kvm/msg160796.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…