9.8
CVSSv3

CVE-2017-12762

Published: 09/08/2017 Updated: 19/01/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...

Mailing Lists

Hello, I stumbled upon CVE-2017-12762 which has a CVSS score of 10 and I think the patch is incomplete and it might have regressed in the stable version I am probably wrong hence this email to see if anyone familiar with this CVE and the fix and tell me if I am wrong ## Incomplete patch The patch can be found in gitkernelorg/pub/scm/li ...
Hi Brad, Thank you very much for your reply This actually clarifies everything :) Ibrahim On Tue, Feb 11, 2020 at 9:37 PM Brad Spengler <spender () grsecurity net> wrote: -- Regards Ibrahim M El-Sayed Security Engineer Website: wwwibrahim-elsayedcom @ibrahim_mosaad ...
Hi Ibrahim, This isn't correct There is a 'count' variable that decrements to zero, yes, but that's not what is used to index the strings 'res' is used for that, and it increments from zero as you'd expect Regarding OOB, there is the read-by-word trickery, but it's safe and won't trip up KASAN for the max 7 bytes it can end up reading past ...