ID

VAR-201801-1853


CVE

CVE-2017-16930


TITLE

Claymore Dual GPU Miner Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2017-011199 // CNNVD: CNNVD-201712-098

DESCRIPTION

The remote management interface on the Claymore Dual GPU miner 10.1 allows an unauthenticated remote attacker to execute arbitrary code due to a stack-based buffer overflow in the request handler. This can be exploited via a long API request that is mishandled during logging. Claymore Dual GPU Miner Contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. ClaymoreDualGPUminer is a GPU monitoring software for mining (virtual currency computing)

Trust: 2.25

sources: NVD: CVE-2017-16930 // JVNDB: JVNDB-2017-011199 // CNVD: CNVD-2018-00236 // VULMON: CVE-2017-16930

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-00236

AFFECTED PRODUCTS

vendor:claymore dual minermodel:claymore dual minerscope:eqversion:10.1

Trust: 1.6

vendor:nanopoolmodel:claymore dual minerscope:eqversion:10.1

Trust: 0.8

vendor:claymoremodel:dual gpu minerscope:eqversion:10.1

Trust: 0.6

sources: CNVD: CNVD-2018-00236 // JVNDB: JVNDB-2017-011199 // CNNVD: CNNVD-201712-098 // NVD: CVE-2017-16930

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-16930
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-16930
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-00236
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201712-098
value: CRITICAL

Trust: 0.6

VULMON: CVE-2017-16930
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-16930
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-00236
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-16930
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-00236 // VULMON: CVE-2017-16930 // JVNDB: JVNDB-2017-011199 // CNNVD: CNNVD-201712-098 // NVD: CVE-2017-16930

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2017-011199 // NVD: CVE-2017-16930

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-098

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201712-098

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011199

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2017-16930

PATCH

title:Claymore-Dual-Minerurl:https://github.com/nanopool/Claymore-Dual-Miner

Trust: 0.8

sources: JVNDB: JVNDB-2017-011199

EXTERNAL IDS

db:NVDid:CVE-2017-16930

Trust: 3.1

db:OPENWALLid:OSS-SECURITY/2017/12/04/3

Trust: 1.7

db:EXPLOIT-DBid:43231

Trust: 1.1

db:JVNDBid:JVNDB-2017-011199

Trust: 0.8

db:EXPLOITALERTid:28087

Trust: 0.6

db:CNVDid:CNVD-2018-00236

Trust: 0.6

db:CNNVDid:CNNVD-201712-098

Trust: 0.6

db:VULMONid:CVE-2017-16930

Trust: 0.1

sources: CNVD: CNVD-2018-00236 // VULMON: CVE-2017-16930 // JVNDB: JVNDB-2017-011199 // CNNVD: CNNVD-201712-098 // NVD: CVE-2017-16930

REFERENCES

url:https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-16930

Trust: 2.5

url:http://www.openwall.com/lists/oss-security/2017/12/04/3

Trust: 1.7

url:https://www.exploit-db.com/exploits/43231/

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16930

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-16930

Trust: 0.8

url:http://seclists.org/fulldisclosure/2017/dec/22

Trust: 0.6

url:http://www.exploitalert.com/view-details.html?id=28087

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-00236 // VULMON: CVE-2017-16930 // JVNDB: JVNDB-2017-011199 // CNNVD: CNNVD-201712-098 // NVD: CVE-2017-16930

SOURCES

db:CNVDid:CNVD-2018-00236
db:VULMONid:CVE-2017-16930
db:JVNDBid:JVNDB-2017-011199
db:CNNVDid:CNNVD-201712-098
db:NVDid:CVE-2017-16930

LAST UPDATE DATE

2024-08-14T14:13:03.151000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-00236date:2018-01-04T00:00:00
db:VULMONid:CVE-2017-16930date:2017-12-21T00:00:00
db:JVNDBid:JVNDB-2017-011199date:2018-01-11T00:00:00
db:CNNVDid:CNNVD-201712-098date:2017-12-06T00:00:00
db:NVDid:CVE-2017-16930date:2017-12-21T16:38:29.337

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-00236date:2018-01-04T00:00:00
db:VULMONid:CVE-2017-16930date:2017-12-05T00:00:00
db:JVNDBid:JVNDB-2017-011199date:2018-01-11T00:00:00
db:CNNVDid:CNNVD-201712-098date:2017-12-06T00:00:00
db:NVDid:CVE-2017-16930date:2017-12-05T09:29:00.287