Vulnerability Details CVE-2017-1000372
A flaw exists in OpenBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.054
EPSS Ranking 89.5%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-1000372
-
cpe:2.3:o:openbsd:openbsd:-
-
cpe:2.3:o:openbsd:openbsd:2.0
-
cpe:2.3:o:openbsd:openbsd:2.1
-
cpe:2.3:o:openbsd:openbsd:2.2
-
cpe:2.3:o:openbsd:openbsd:2.3
-
cpe:2.3:o:openbsd:openbsd:2.4
-
cpe:2.3:o:openbsd:openbsd:2.5
-
cpe:2.3:o:openbsd:openbsd:2.6
-
cpe:2.3:o:openbsd:openbsd:2.7
-
cpe:2.3:o:openbsd:openbsd:2.8
-
cpe:2.3:o:openbsd:openbsd:2.9
-
cpe:2.3:o:openbsd:openbsd:3.0
-
cpe:2.3:o:openbsd:openbsd:3.1
-
cpe:2.3:o:openbsd:openbsd:3.2
-
cpe:2.3:o:openbsd:openbsd:3.3
-
cpe:2.3:o:openbsd:openbsd:3.4
-
cpe:2.3:o:openbsd:openbsd:3.5
-
cpe:2.3:o:openbsd:openbsd:3.6
-
cpe:2.3:o:openbsd:openbsd:3.7
-
cpe:2.3:o:openbsd:openbsd:3.8
-
cpe:2.3:o:openbsd:openbsd:3.9
-
cpe:2.3:o:openbsd:openbsd:4.0
-
cpe:2.3:o:openbsd:openbsd:4.1
-
cpe:2.3:o:openbsd:openbsd:4.2
-
cpe:2.3:o:openbsd:openbsd:4.3
-
cpe:2.3:o:openbsd:openbsd:4.4
-
cpe:2.3:o:openbsd:openbsd:4.5
-
cpe:2.3:o:openbsd:openbsd:4.6
-
cpe:2.3:o:openbsd:openbsd:4.7
-
cpe:2.3:o:openbsd:openbsd:4.8
-
cpe:2.3:o:openbsd:openbsd:4.9
-
cpe:2.3:o:openbsd:openbsd:5.0
-
cpe:2.3:o:openbsd:openbsd:5.1
-
cpe:2.3:o:openbsd:openbsd:5.2
-
cpe:2.3:o:openbsd:openbsd:5.3
-
cpe:2.3:o:openbsd:openbsd:5.4
-
cpe:2.3:o:openbsd:openbsd:5.5
-
cpe:2.3:o:openbsd:openbsd:5.6
-
cpe:2.3:o:openbsd:openbsd:5.7
-
cpe:2.3:o:openbsd:openbsd:5.8
-
cpe:2.3:o:openbsd:openbsd:5.9
-
cpe:2.3:o:openbsd:openbsd:6.0
-
cpe:2.3:o:openbsd:openbsd:6.1