CVE-2017-1000410

Description

The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(&efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(&ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) &efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).

Category

7.5
CVSS
Severity: High
CVSS 3.0 •
CVSS 2.0 •
EPSS 2.02% Top 20%
Vendor Advisory debian.org Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory ubuntu.com Vendor Advisory ubuntu.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://seclists.org/oss-sec/2017/q4/357 patch mailing list third party advisory issue tracking
https://www.debian.org/security/2018/dsa-4082 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1062 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:0654 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1319 third party advisory vendor advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 third party advisory
https://access.redhat.com/errata/RHSA-2018:0676 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1170 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1130 third party advisory vendor advisory
https://www.debian.org/security/2017/dsa-4073 third party advisory vendor advisory
http://www.securityfocus.com/bid/102101 third party advisory vdb entry issue tracking
https://usn.ubuntu.com/3933-2/ vendor advisory
https://usn.ubuntu.com/3933-1/ vendor advisory

Frequently Asked Questions

What is the severity of CVE-2017-1000410?
CVE-2017-1000410 has been scored as a high severity vulnerability.
How to fix CVE-2017-1000410?
To fix CVE-2017-1000410, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2017-1000410 being actively exploited in the wild?
It is possible that CVE-2017-1000410 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~2% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.