Vulnerability Details : CVE-2017-17482
An issue was discovered in OpenVMS through V8.4-2L2 on Alpha and through V8.4-2L1 on IA64, and VAX/VMS 4.0 and later. A malformed DCL command table may result in a buffer overflow allowing a local privilege escalation when a non-privileged account enters a crafted command line. This bug is exploitable on VAX and Alpha and may cause a process crash on IA64. Software was affected regardless of whether it was directly shipped by VMS Software, Inc. (VSI), HPE, HP, Compaq, or Digital Equipment Corporation.
Vulnerability category: OverflowGain privilege
Products affected by CVE-2017-17482
- cpe:2.3:o:hp:openvms:*:*:*:*:vax:*:*:*
- cpe:2.3:o:hp:openvms:*:*:*:*:alpha:*:*:*
- cpe:2.3:o:hp:openvms:*:*:*:*:vms:*:*:*
- cpe:2.3:o:hp:openvms:*:*:*:*:ia64:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-17482
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-17482
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-17482
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-17482
-
https://groups.google.com/forum/#!topic/comp.os.vms/BYIUQ0lJ-s0
Google Groepen
-
http://www.openvms.org/node/121
404 Not FoundVendor Advisory
-
https://www.theregister.co.uk/2018/02/06/openvms_vulnerability/
Ghost in the DCL shell: OpenVMS, touted as ultra reliable, had a local root hole for 30 years • The RegisterThird Party Advisory
Jump to