CVE-2017-17558

Current Description

The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.

Basic Data

PublishedDecember 12, 2017
Last ModifiedMay 14, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-787
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorPHYSICAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score6.6
CVSS 3 - Base SeverityMEDIUM
Exploitability Score0.7
Base SeverityMEDIUM

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********4.14.5
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSSuseLinux Enterprise Server11extra******
    2.3OSSuseLinux Enterprise Server11sp4******

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel *
Suse Linux Enterprise Server 11

References

NameSourceURLTags
SUSE-SU-2018:0011http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlSUSEThird Party Advisory
http://openwall.com/lists/oss-security/2017/12/12/7http://openwall.com/lists/oss-security/2017/12/12/7MISCMailing List Third Party Advisory
RHSA-2018:0676https://access.redhat.com/errata/RHSA-2018:0676REDHAT
RHSA-2018:1062https://access.redhat.com/errata/RHSA-2018:1062REDHAT
RHSA-2019:1170https://access.redhat.com/errata/RHSA-2019:1170REDHAT
RHSA-2019:1190https://access.redhat.com/errata/RHSA-2019:1190REDHAT
[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security updatehttps://lists.debian.org/debian-lts-announce/2018/01/msg00004.htmlMLIST
USN-3619-1https://usn.ubuntu.com/3619-1/UBUNTU
USN-3619-2https://usn.ubuntu.com/3619-2/UBUNTU
USN-3754-1https://usn.ubuntu.com/3754-1/UBUNTU
DSA-4073https://www.debian.org/security/2017/dsa-4073DEBIANThird Party Advisory
DSA-4082https://www.debian.org/security/2018/dsa-4082DEBIAN
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlMISC
https://www.spinics.net/lists/linux-usb/msg163644.htmlhttps://www.spinics.net/lists/linux-usb/msg163644.htmlMISCIssue Tracking Patch