7.8
CVSSv3

CVE-2017-7308

Published: 29/03/2017 Updated: 14/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 738
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The packet_set_ring function in net/packet/af_packet.c in the Linux kernel up to and including 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise MRG 2Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVS ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
The system could be made to crash under certain conditions ...
Infinite recursion in ahashc by triggering EBUSY on a full queue:A vulnerability was found in crypto/ahashc in the Linux kernel which allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue(CVE-2017-7618) Time subsystem allows local users to discover real ...
It was found that the packet_set_ring() function of the Linux kernel's networking implementation did not properly validate certain block-size data A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow resulting in a system crash or a privilege escalation ...

Exploits

This Metasploit module exploits a heap-out-of-bounds write in the packet_set_ring function in net/packet/af_packetc (AF_PACKET) in the Linux kernel to execute code as root (CVE-2017-7308) The bug was initially introduced in 2011 and patched in version 4106, potentially affecting a large number of kernels; however this exploit targets only syste ...
// A proof-of-concept local root exploit for CVE-2017-7308 // Includes a SMEP & SMAP bypass // Tested on Ubuntu / Linux Mint: // - 480-34-generic // - 480-36-generic // - 480-39-generic // - 480-41-generic // - 480-42-generic // - 480-44-generic // - 480-45-generic // githubcom/xairy/kernel-exploits/tree/master/CVE-2017 ...
// A proof-of-concept local root exploit for CVE-2017-7308 // Includes a SMEP & SMAP bypass // Tested on 480-41-generic Ubuntu kernel // githubcom/xairy/kernel-exploits/tree/master/CVE-2017-7308 // // Usage: // user@ubuntu:~$ uname -a // Linux ubuntu 480-41-generic #44~16041-Ubuntu SMP Fri Mar 3 // user@ubuntu:~$ gcc pwnc ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Post::Linux::Priv include Msf::Post::Linux::System include Msf::Post::Linux::Kernel include Ms ...

Github Repositories

Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities

KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities Setup /setupsh /buildsh It's been tested on Ubuntu 1804 Usage source koobe/bin/activate cd aeg-analysis python mainpy -h Tutorial CVE-2017-7308 CVE-2018-5703 CVE-2017-7533 CVE-2017-1000112 Utilit

A simple anti-rootkit Linux kernel module for an 'Operating Systems Security' course.

About This is a simple anti-rootkit Linux Kernel Module written for a Operating Systems Security course It contains 7 different kernel integrity checks It is only compatible with the x86_64 architecture, but some non architecture specific checks can be used on a different architecture Table of Contents Installation Usage Available checks Pinned CR bits MSR LSTAR Syscall

CVE-2017-7308 POC

CVE-2017-7308 CVE ID: CVE-2017-7308 Publish date: 2017-03-29T20:59:00373 Base score (CVSS 30/31): 78 Description: The packet_set_ring function in net/packet/af_packetc in the Linux kernel through 4106 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privil

Disclaimer USE AT YOUR OWN RISK! AUTHORS OF THIS CODE ARE NOT RESPONSIBLE FOR ANY HARM DONE TO YOUR MACHINE, YOUR BELONGINGS OR YOURSELF Note that code in this repository exploits kernel code In case you try the code out on a remote machine, make sure you can reboot it remotely in case of a crash About This repository contains the exploits showcasing the BlindSide attack des

attachment and write up for D^3CTF 2023's pwn challenge - d3kcache

[D^3CTF 2023] d3kcache: From null-byte cross-cache overflow to infinite arbitrary read & write in physical memory space 0x00 Before we start It may be my last time to design the Pwn challenge for D^3CTF before my undergraduate graduation Although I have always wanted to come up with some good challenges, I have been too inexperienced to create anything particularly

kernel-exploits CVE-2016-2384: a double-free in USB MIDI driver CVE-2016-9793: a signedness issue with SO_SNDBUFFORCE and SO_RCVBUFFORCE socket options CVE-2017-6074: a double-free in DCCP protocol CVE-2017-7308: a signedness issue in AF_PACKET sockets

some exploits for kernel linux

kernel-linux-xpls some exploits for kernel linux CVE-2017-7308 Include SMEP and Kaslr bypass CVE-2017-6074 Include SMEP bypass and

Linux kernel < 4.10.15 - Race Condition Privilege Escalation

Ecploit-kernel-410-linux-local Linux kernel &lt; 41015 - Race Condition Privilege Escalation Linux kernel &lt; 41015 CVE-2017-1000112 This is a proof-of-concept local root exploit for the vulnerability in the UFO Linux kernel implementation CVE-2017-1000112 Some details: wwwopenwallcom/lists/oss-security/2017/08/13/1 s/timerfdc Vulnerbility Exploit Vulne

Bitdefender introspection PoC for VBH This project demonstrates protection for three types of exploits: SMEP/SMAP disabling vDSO modifications runc overwrite SMEP/SMAP disable Overview SMEP: If set, execution of code in a higher ring generates a fault SMAP: If set, access of data in a higher ring generates a fault A malicious program may disable SMAP in order to access dat

Recent Articles

Don't be BlindSided: Watch speculative memory probing bypass kernel defenses, give malware root control
The Register • Thomas Claburn in San Francisco • 10 Sep 2020

Silently side-step software safeguards

Video Boffins in America, the Netherlands, and Switzerland have devised a Spectre-style attack on modern processors that can defeat defenses that are supposed to stop malicious software from hijacking a computer's operating system. The end result is exploit code able to bypass a crucial protection mechanism and take over a device to hand over root access. That's a lot to unpack so we'll start from the top. Let's say you find a security vulnerability, such as a buffer overflow, in the kernel of a...