CVE-2017-7892

EUVD-2017-16864
Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler optimization. A remote attacker can trigger a segfault in a 32-bit libcapnp application because Cap'n Proto relies on pointer arithmetic calculations that overflow. An example compiler with optimization that elides a bounds check in such calculations is Apple LLVM version 8.1.0 (clang-802.0.41). The attack vector is a crafted far pointer within a message.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
Affected Products (NVD)
VendorProductVersion
capnprotocapnproto
𝑥
≤ 0.5.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
capnproto
bookworm
0.9.2-2
fixed
bullseye
0.7.0-7
fixed
sid
1.0.1-4
fixed
trixie
1.0.1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
capnproto
artful
ignored
bionic
Fixed 0.6.1-1
released
precise
dne
trusty
Fixed 0.4.0-1ubuntu2.1
released
xenial
Fixed 0.5.3-2ubuntu1.1
released
yakkety
ignored
zesty
ignored