Open
Description
id: 2559
title: 'RVD#2559: net/netfilter/xt_osf.c does not require the CAP_NET_ADMIN for add_callback
or remove_callback operations, allows local users to bypass intended access restrictions'
type: vulnerability
description: net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require
the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which
allows local users to bypass intended access restrictions because the xt_osf_fingers
data structure is shared across all net namespaces.
cwe: CWE-862
cve: CVE-2017-17450
keywords:
- MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex,
ER-One, UVD
system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200,
ER-Lite, ER-Flex, ER-One, UVD
vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots
severity:
rvss-score: 8.3
rvss-vector: RVSS:1.0/AV:L/AC:L/PR:L/UI:N/Y:T/S:U/C:H/I:H/A:H/H:U/
severity-description: High
cvss-score: 7.8
cvss-vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
links:
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17450
- https://github.com/aliasrobotics/RVD/issues/2559
flaw:
phase: runtime-operation
specificity: general issue
architectural-location: plataform code
application: Linux
subsystem: Kernel
package: linux-image-generic 4.4.0.62.65 amd64
languages: C
date-detected: 2020-04-23
detected-by: Offensive Team (Alias Robotics)
detected-by-method: Testing Static, Alurity:test_vulners
date-reported: '2020-06-24'
reported-by: "Victor Mayoral Vilches (Alias Robotics)"
reported-by-relationship: security researcher
issue: https://github.com/aliasrobotics/RVD/issues/2559
reproducibility: Always
trace: Not disclosed
reproduction: Not disclosed
reproduction-image: Not disclosed
exploitation:
description: Not disclosed
exploitation-image: Not disclosed
exploitation-vector: Not disclosed
exploitation-recipe: ''
mitigation:
description: Not disclosed
pull-request: Not disclosed
date-mitigation: null