CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2017-1000112

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
Publish Date : 2017-10-04 Last Update Date : 2018-08-05
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
6.9
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Memory corruption
CWE ID 362

- Related OVAL Definitions

Title Definition Id Class Family
RHSA-2017:2930: kernel security and bug fix update (Important) oval:com.redhat.rhsa:def:20172930 unix
RHSA-2017:2931: kernel-rt security and bug fix update (Important) oval:com.redhat.rhsa:def:20172931 unix
RHSA-2017:3200: kernel security and bug fix update (Important) oval:com.redhat.rhsa:def:20173200 unix
RHSA-2019:1931: kernel security and bug fix update (Important) oval:com.redhat.rhsa:def:20191931 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2017-1000112

# Product Type Vendor Product Version Update Edition Language
1 OS Linux Linux Kernel 4.13.9 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Linux Linux Kernel 1

- References For CVE-2017-1000112

https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
http://seclists.org/oss-sec/2017/q3/277
MLIST [oss-security] 20170810 Linux kernel: CVE-2017-1000112: Exploitable memory corruption due to UFO to non-UFO path switch
http://www.debian.org/security/2017/dsa-3981
DEBIAN DSA-3981
http://www.securityfocus.com/bid/100262
BID 100262 Linux Kernel CVE-2017-1000112 Local Memory Corruption Vulnerability Release Date:2017-09-25
http://www.securitytracker.com/id/1039162
SECTRACK 1039162
https://access.redhat.com/errata/RHSA-2017:2918
REDHAT RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2931
REDHAT RHSA-2017:2931
https://www.exploit-db.com/exploits/45147/
EXPLOIT-DB 45147
https://access.redhat.com/errata/RHSA-2017:2930
REDHAT RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:3200
REDHAT RHSA-2017:3200

- Metasploit Modules Related To CVE-2017-1000112

Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
This module attempts to gain root privileges on Linux systems by abusing UDP Fragmentation Offload (UFO). This exploit targets only systems using Ubuntu (Trusty / Xenial) kernels 4.4.0-21 <= 4.4.0-89 and 4.8.0-34 <= 4.8.0-58, including Linux distros based on Ubuntu, such as Linux Mint. The target system must have unprivileged user namespaces enabled and SMAP disabled. Bypasses for SMEP and KASLR are included. Failed exploitation may crash the kernel. This module has been tested successfully on various Ubuntu and Linux Mint systems, including: Ubuntu 14.04.5 4.4.0-31-generic x64 Desktop; Ubuntu 16.04 4.8.0-53-generic; Linux Mint 17.3 4.4.0-89-generic; Linux Mint 18 4.8.0-58-generic
Module type : exploit Rank : good Platforms : Linux


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.