Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11171 Explained : Impact and Mitigation

Learn about CVE-2017-11171, a vulnerability in gnome-session allowing local attackers to establish ICE connections with invalid authentication data, leading to CPU consumption and session malfunction. Find mitigation steps and prevention strategies here.

In previous versions of gnome-session, a flaw in the accept_ice_connection() function allowed an attacker to establish ICE connections with invalid authentication data, leading to CPU consumption and session malfunction.

Understanding CVE-2017-11171

This CVE describes a vulnerability in gnome-session versions up to 2.29.92 that could be exploited by a local attacker.

What is CVE-2017-11171?

The vulnerability stemmed from improper reference counting in the accept_ice_connection() function, enabling attackers to create ICE connections with gnome-session using invalid authentication data.

The Impact of CVE-2017-11171

        Local attackers could exploit the flaw to establish ICE connections with gnome-session using an invalid magic cookie, leading to file descriptor leaks and CPU consumption.
        The gnome-session process could enter an infinite loop, consuming 100% of the CPU and causing the graphical session to malfunction.

Technical Details of CVE-2017-11171

This section provides more in-depth technical details about the vulnerability.

Vulnerability Description

The flaw in the accept_ice_connection() function in gnome-session versions up to 2.29.92 allowed local attackers to establish ICE connections with invalid authentication data, causing file descriptor leaks and CPU consumption.

Affected Systems and Versions

        Systems running gnome-session up to version 2.29.92 were affected by this vulnerability.

Exploitation Mechanism

        Attackers with local access could exploit the vulnerability by using invalid authentication data to establish ICE connections with gnome-session.

Mitigation and Prevention

To address CVE-2017-11171, follow these mitigation and prevention strategies.

Immediate Steps to Take

        Update gnome-session to a version beyond 2.29.92 to mitigate the vulnerability.
        Monitor CPU usage for any unusual spikes that could indicate exploitation.

Long-Term Security Practices

        Implement proper authentication mechanisms to prevent unauthorized ICE connections.
        Regularly monitor and update software to address security vulnerabilities.

Patching and Updates

        Apply patches provided by the vendor to fix the flaw in gnome-session and prevent exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now