CVE-2017-17448
kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
net/netfilter/nfnetlink_cthelper.c en el kernel de Linux hasta la versiĆ³n 4.14.4 no requiere la capacidad CAP_NET_ADMIN para operaciones "new", "get" y "del", lo que permite que usuarios locales omitan las restricciones de acceso establecidas debido a que la estructura de datos nfnl_cthelper_list se comparte entre todos los espacios de nombres de la red.
The net/netfilter/nfnetlink_cthelper.c function in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations. This allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-03 CVE Published
- 2017-12-06 CVE Reserved
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
- CWE-862: Missing Authorization
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/102117 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://patchwork.kernel.org/patch/10089373 | 2019-10-03 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:0654 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2018:0676 | 2019-10-03 | |
https://access.redhat.com/errata/RHSA-2018:1062 | 2019-10-03 | |
https://usn.ubuntu.com/3617-1 | 2019-10-03 | |
https://usn.ubuntu.com/3617-2 | 2019-10-03 | |
https://usn.ubuntu.com/3617-3 | 2019-10-03 | |
https://usn.ubuntu.com/3619-1 | 2019-10-03 | |
https://usn.ubuntu.com/3619-2 | 2019-10-03 | |
https://usn.ubuntu.com/3620-1 | 2019-10-03 | |
https://usn.ubuntu.com/3620-2 | 2019-10-03 | |
https://usn.ubuntu.com/3632-1 | 2019-10-03 | |
https://www.debian.org/security/2017/dsa-4073 | 2019-10-03 | |
https://www.debian.org/security/2018/dsa-4082 | 2019-10-03 | |
https://access.redhat.com/security/cve/CVE-2017-17448 | 2018-04-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1525768 | 2018-04-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.14.4 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.14.4" | - |
Affected
|