CVE-2017-8797
moderate-risk
Published 2017-07-02
The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.
Do I need to act?
!
30.4% chance of exploitation in next 30 days
EPSS score — higher than 70% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (26)
Third Party Advisory
http://www.securityfocus.com/bid/99298
Broken Link
http://www.securitytracker.com/id/1038790
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1842
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2077
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2437
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2669
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1466329
Third Party Advisory
http://www.securityfocus.com/bid/99298
Broken Link
http://www.securitytracker.com/id/1038790
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1842
and 6 more references
47
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
16/34 · Moderate
Exposure
5/34 · Minimal