Learn about CVE-2017-11473, a critical buffer overflow vulnerability in the Linux kernel allowing local users to escalate privileges. Find mitigation steps and long-term security practices here.
CVE-2017-11473, published on July 20, 2017, addresses a buffer overflow vulnerability in the Linux kernel that allows local users to escalate privileges by exploiting a specific function.
Understanding CVE-2017-11473
This CVE entry highlights a critical security issue within the Linux kernel that could lead to privilege escalation for local users.
What is CVE-2017-11473?
The vulnerability lies in the mp_override_legacy_irq() function in the file arch/x86/kernel/acpi/boot.c of the Linux kernel up to version 3.2. By crafting a malicious ACPI table, local users can exploit a buffer overflow, enabling them to elevate their privileges.
The Impact of CVE-2017-11473
The vulnerability allows unauthorized users to gain escalated privileges on affected systems, potentially leading to unauthorized access and control.
Technical Details of CVE-2017-11473
This section delves into the technical aspects of the CVE, including the vulnerability description, affected systems, and exploitation mechanism.
Vulnerability Description
The buffer overflow in the mp_override_legacy_irq() function in the Linux kernel through version 3.2 enables local users to gain privileges through a manipulated ACPI table.
Affected Systems and Versions
Exploitation Mechanism
Local users can exploit the vulnerability by creating a crafted ACPI table, triggering a buffer overflow that allows privilege escalation.
Mitigation and Prevention
In this section, we outline the steps to mitigate the CVE's impact and prevent future occurrences.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates