Vulnerability CVE-2017-1000370


Published: 2017-06-19

Description:
The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40000000 nullifying the protection of the offset2lib patch. This affects Linux Kernel version 4.11.5 and earlier. This is a different issue than CVE-2017-1000371. This issue appears to be limited to i386 based systems.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Linux 'offset2lib' Stack Clash Exploit
Qualys
29.06.2017
Med.
Linux 'ldso_hwcap' Local Root Stack Clash Exploit
Qualys
29.06.2017

Type:

CWE-noinfo

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Linux -> Linux kernel 

 References:
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99149
https://access.redhat.com/security/cve/CVE-2017-1000370
https://www.exploit-db.com/exploits/42273/
https://www.exploit-db.com/exploits/42274/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Copyright 2024, cxsecurity.com

 

Back to Top