CVE-2017-15102

Published: Nov 15, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2017-6569 Aliases: GSD-2017-15102
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,3
Attack Vector: physical
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 6,9
Access Vector: local
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0011
Percentile
0,3th
Updated

EPSS Score Trend (Last 91 Days)

476

NULL Pointer Dereference

Stable
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality
Potential Impacts:
Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands Read Memory Modify Memory
Applicable Platforms
Languages: C, C#, C++, Go, Java
View CWE Details
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
To 4.8.1 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2fae9…
https://bugzilla.redhat.com/show_bug.cgi?id=1505905
Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1505905
http://seclists.org/oss-sec/2017/q4/238
Issue Tracking Mailing List Third Party Advisory
http://seclists.org/oss-sec/2017/q4/238
https://github.com/torvalds/linux/commit/2fae9e5a7babada041e2e161699ade2447a019…
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
http://www.securityfocus.com/bid/101790
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/101790
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2fae9…
https://bugzilla.redhat.com/show_bug.cgi?id=1505905
Issue Tracking Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1505905
http://seclists.org/oss-sec/2017/q4/238
Issue Tracking Mailing List Third Party Advisory
http://seclists.org/oss-sec/2017/q4/238
https://github.com/torvalds/linux/commit/2fae9e5a7babada041e2e161699ade2447a019…
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
http://www.securityfocus.com/bid/101790
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/101790