Show plain JSON{"dataType": "CVE_RECORD", "containers": {"adp": [{"title": "CVE Program Container", "references": [{"url": "https://access.redhat.com/errata/RHSA-2017:2798", "name": "RHSA-2017:2798", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2795", "name": "RHSA-2017:2795", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "http://www.securitytracker.com/id/1039434", "name": "1039434", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2801", "name": "RHSA-2017:2801", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2796", "name": "RHSA-2017:2796", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "http://www.securityfocus.com/bid/101010", "name": "101010", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2799", "name": "RHSA-2017:2799", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2794", "name": "RHSA-2017:2794", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2793", "name": "RHSA-2017:2793", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2797", "name": "RHSA-2017:2797", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2802", "name": "RHSA-2017:2802", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt", "tags": ["x_refsource_MISC", "x_transferred"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2800", "name": "RHSA-2017:2800", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T22:00:39.693Z"}}, {"title": "CISA ADP Vulnrichment", "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"id": "CVE-2017-1000253", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-09-07T03:55:23.405987Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2024-09-09", "reference": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json"}}}], "affected": [{"cpes": ["cpe:2.3:o:centos:centos:6.0:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.0"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.1:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.1"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.2:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.2"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.3:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.3"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.4:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.4"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.5:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.5"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.6:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.6"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.7:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.7"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.8:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.8"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:6.9:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "6.9"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:7.1406:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "7.1406"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:7.1503:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "7.1503"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:7.1511:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "7.1511"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:centos:centos:7.1611:*:*:*:*:*:*:*"], "vendor": "centos", "product": "centos", "versions": [{"status": "affected", "version": "7.1611"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux", "versions": [{"status": "affected", "version": "6.0"}, {"status": "affected", "version": "6.1"}, {"status": "affected", "version": "6.2"}, {"status": "affected", "version": "6.3"}, {"status": "affected", "version": "6.4"}, {"status": "affected", "version": "6.5"}, {"status": "affected", "version": "6.6"}, {"status": "affected", "version": "6.7"}, {"status": "affected", "version": "6.8"}, {"status": "affected", "version": "6.9"}, {"status": "affected", "version": "7.0"}, {"status": "affected", "version": "7.1"}, {"status": "affected", "version": "7.2"}, {"status": "affected", "version": "7.3"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"], "vendor": "linux", "product": "linux_kernel", "versions": [{"status": "affected", "version": "2.6.25", "lessThan": "3.2.70", "versionType": "custom"}, {"status": "affected", "version": "3.3", "lessThan": "3.4.109", "versionType": "custom"}, {"status": "affected", "version": "3.5", "lessThan": "3.10.77", "versionType": "custom"}, {"status": "affected", "version": "3.11", "lessThan": "3.12.43", "versionType": "custom"}, {"status": "affected", "version": "3.13", "lessThan": "3.14.41", "versionType": "custom"}, {"status": "affected", "version": "3.15", "lessThan": "3.16.35", "versionType": "custom"}, {"status": "affected", "version": "3.17", "lessThan": "3.18.14", "versionType": "custom"}, {"status": "affected", "version": "3.19", "lessThan": "3.19.7", "versionType": "custom"}, {"status": "affected", "version": "1.0", "lessThan": "4.0.2", "versionType": "custom"}], "defaultStatus": "unknown"}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"}]}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-06T17:10:39.045Z"}, "timeline": [{"lang": "en", "time": "2024-09-09T00:00:00+00:00", "value": "CVE-2017-1000253 added to CISA KEV"}]}], "cna": {"affected": [{"vendor": "n/a", "product": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2017-10-03T00:00:00", "references": [{"url": "https://access.redhat.com/errata/RHSA-2017:2798", "name": "RHSA-2017:2798", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2795", "name": "RHSA-2017:2795", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "http://www.securitytracker.com/id/1039434", "name": "1039434", "tags": ["vdb-entry", "x_refsource_SECTRACK"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2801", "name": "RHSA-2017:2801", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2796", "name": "RHSA-2017:2796", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "http://www.securityfocus.com/bid/101010", "name": "101010", "tags": ["vdb-entry", "x_refsource_BID"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2799", "name": "RHSA-2017:2799", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2794", "name": "RHSA-2017:2794", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2793", "name": "RHSA-2017:2793", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2797", "name": "RHSA-2017:2797", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2802", "name": "RHSA-2017:2802", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt", "tags": ["x_refsource_MISC"]}, {"url": "https://access.redhat.com/errata/RHSA-2017:2800", "name": "RHSA-2017:2800", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}], "dateAssigned": "2017-09-25T00:00:00", "descriptions": [{"lang": "en", "value": "Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the \"gap\" between the stack and the binary."}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "text", "description": "n/a"}]}], "providerMetadata": {"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", "dateUpdated": "2017-12-08T10:57:01"}, "x_legacyV4Record": {"affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "n/a"}]}, "product_name": "n/a"}]}, "vendor_name": "n/a"}]}}, "data_type": "CVE", "references": {"reference_data": [{"url": "https://access.redhat.com/errata/RHSA-2017:2798", "name": "RHSA-2017:2798", "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2795", "name": "RHSA-2017:2795", "refsource": "REDHAT"}, {"url": "http://www.securitytracker.com/id/1039434", "name": "1039434", "refsource": "SECTRACK"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2801", "name": "RHSA-2017:2801", "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2796", "name": "RHSA-2017:2796", "refsource": "REDHAT"}, {"url": "http://www.securityfocus.com/bid/101010", "name": "101010", "refsource": "BID"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2799", "name": "RHSA-2017:2799", "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2794", "name": "RHSA-2017:2794", "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2793", "name": "RHSA-2017:2793", "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2797", "name": "RHSA-2017:2797", "refsource": "REDHAT"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2802", "name": "RHSA-2017:2802", "refsource": "REDHAT"}, {"url": "https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt", "name": "https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt", "refsource": "MISC"}, {"url": "https://access.redhat.com/errata/RHSA-2017:2800", "name": "RHSA-2017:2800", "refsource": "REDHAT"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "eng", "value": "Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the \"gap\" between the stack and the binary."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2017-1000253", "STATE": "PUBLIC", "ASSIGNER": "cve@mitre.org", "REQUESTER": "qsa@qualys.com", "DATE_ASSIGNED": "2017-09-25"}}}}, "cveMetadata": {"cveId": "CVE-2017-1000253", "state": "PUBLISHED", "dateUpdated": "2024-09-10T03:55:14.762Z", "dateReserved": "2017-10-03T00:00:00", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "datePublished": "2017-10-04T01:00:00", "assignerShortName": "mitre"}, "dataVersion": "5.1"}