First published: Mon Aug 28 2017(Updated: )
The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=4.2<4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13715 is classified as a medium severity vulnerability that can lead to a denial of service or potential arbitrary code execution.
To fix CVE-2017-13715, upgrade to a version of the Linux kernel later than 4.3 where the vulnerability has been addressed.
CVE-2017-13715 affects the Linux kernel versions prior to 4.3, particularly those using the flow dissector functionality.
CVE-2017-13715 can be exploited by remote attackers using a specially crafted MPLS packet.
CVE-2017-13715 is associated with denial of service attacks that can lead to system crashes or arbitrary code execution.