6.9
CVSSv2

CVE-2017-7533

Published: 05/08/2017 Updated: 21/06/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 696
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Race condition in the fsnotify implementation in the Linux kernel up to and including 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 72 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2014-9940 A use-after-free flaw in the voltage and current regulator driver could allow a local user to cause a denial of service or potentially escalate privileges CVE-2017-7346 Li ...
Buffer overflow in mp_override_legacy_irq():Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/bootc in the Linux kernel through 4122 allows local users to gain privileges via a crafted ACPI table (CVE-2017-11473) A race between inotify_handle_event() and sys_rename():A race condition was found in the Linux kernel, ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
USN-3378-2 introduced a regression the Linux Hardware Enablement kernel ...

Exploits

/* * * * CVE-2017-7533 inotfiy linux kernel vulnerability * * $ gcc -o exploit exploitc -lpthread * $/exploit * * ``` * Listening for events * Listening for events * alloc_len : 50 * longname="test_dir/bbbb32103210321032100��1����" * handle_events() event->name : b, event->len : 16 * Detected overwrite!!! * ca ...

Github Repositories

Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities

KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities Setup /setupsh /buildsh It's been tested on Ubuntu 1804 Usage source koobe/bin/activate cd aeg-analysis python mainpy -h Tutorial CVE-2017-7308 CVE-2018-5703 CVE-2017-7533 CVE-2017-1000112 Utilit

Scoping Wordpress Target 1 Blue Team: Summary of Operations Table of Contents Network Topology Description of Targets Monitoring the Targets Patterns of Traffic & Behavior Suggestions for Going Further Network Topology ======= The following machines were identified on the network: Name of VM 1 Operating System: Linux Purpose: Wordpress Server IP Address: 192168

MoonShine: Seed Selection for OS Fuzzers (USENIX '18) MoonShine selects compact and diverse seeds for OS fuzzers from system call traces of real world programs Please see our USENIX'18 paper MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation for more details Currently, MoonShine can only generate seeds for Syzkaller on Linux Contents Getting St

Final NTO2022 InfoSec report

Linux 10x210 Nmap scan report for 1018210 Host is up (00080s latency) Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 79p1 Debian 10+deb10u2 (protocol 20) 80/tcp open http nginx 1142 3306/tcp open mysql MySQL (unauthorized) 8080/tcp open http nginx 1142 Service Info: OS: Linux; CPE: cpe:/o:linux:li