This is a exploit published for researchers discovered by cloud-based security and compliance solution provider Qualys
Affect kernel versions 2.6.x, 3.10.x and 4.14.x
To successfully exploit this vulnerability, attackers need to have access to the targeted system and run their exploit that leads to a buffer overflow, thereby resulting in the execution of malicious code and achieving complete control of the affected system.