CVE-2017-16995

Scores

EPSS

0.828high82.8%
0%20%40%60%80%100%

Percentile: 82.8%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.2

Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Description

The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-119CWE-787

Exploits

Exploit ID: 44298

Source: exploitdb

URL: https://www.exploit-db.com/exploits/44298

Exploit ID: 45010

Source: exploitdb

URL: https://www.exploit-db.com/exploits/45010

Exploit ID: 45058

Source: exploitdb

URL: https://www.exploit-db.com/exploits/45058

Exploit ID: CVE-2017-16995

Source: github-poc

URL: https://github.com/xxxTectationxxx/CVE-2017-16995

Vulnerable Software (171)

Type: Configuration

Product: kernel-doc-un

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-headers-modules-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-headers-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-image-domU-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-image-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-ancient-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-nouveau-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-radeon-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-ide-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-kvm-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-staging-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: kernel-modules-v4l-un-def

Operating System: altlinux

Trait:
{  "fixed": "1:4.14.8-alt1.1"}

Source: redhat

Type: Configuration

Product: linux

Operating System: debian

Trait:
{  "fixed": "4.14.7-1"}

Source: debian

Type: Configuration

Product: linux

Operating System: debian jessie 8

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: linux

Operating System: debian wheezy 7

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: linux

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu jammy 22.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "4.4.0-119.143"}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu zesty 17.04

Trait:
{  "unfixed": true}

Source: ubuntu