Vulnerability Description
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Libsoup | 2.58 |
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.4 |
| Redhat | Enterprise Linux Server Eus | 7.4 |
| Redhat | Enterprise Linux Server Tus | 7.4 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphtExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/Dec/3ExploitMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/100258Broken Link
- https://access.redhat.com/errata/RHSA-2017:2459Third Party Advisory
- https://www.debian.org/security/2017/dsa-3929Third Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392ExploitTechnical DescriptionThird Party Advisory
- http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphtExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/Dec/3ExploitMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/100258Broken Link
- https://access.redhat.com/errata/RHSA-2017:2459Third Party Advisory
- https://www.debian.org/security/2017/dsa-3929Third Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392ExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-2885?
CVE-2017-2885 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker c...
How severe is CVE-2017-2885?
CVE-2017-2885 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-2885?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Libsoup, Debian Debian Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.