CVE-2017-17807

Published: Dic 20, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2017-8958 Aliases: GSD-2017-17807
ExploitDB:
Other exploit source:
Google Dorks:
LOW 3,3
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
LOW 2,1
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's 'default request-key keyring' via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0006
Percentile
0,2th
Updated

EPSS Score Trend (Last 90 Days)

862

Missing Authorization

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Access Control Availability
Potential Impacts:
Read Application Data Read Files Or Directories Modify Application Data Modify Files Or Directories Gain Privileges Or Assume Identity Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Resource Consumption (Other)
Applicable Platforms
Technologies: AI/ML, Database Server, Not Technology-Specific, Web Server
View CWE Details
Operating System

Linux Kernel by Linux

Version Range Affected
To 4.14.6 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6…
https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a441…
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
http://www.securityfocus.com/bid/102301
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102301
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6…
https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a441…
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
http://www.securityfocus.com/bid/102301
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102301