PCAUSA Rawether framework does not properly validate BPF data, allowing a crafted malicious BPF program to perform operations on memory outside of its typical bounds on the driver's receipt of network packets. Local attackers can exploit this issue to execute arbitrary code with SYSTEM privileges.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T14:16:28.231Z
Reserved: 2016-12-05T00:00:00
Link: CVE-2017-3196

No data.

Status : Deferred
Published: 2017-12-16T02:29:10.557
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-3196

No data.

No data.