[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2016-0728Date: (C)2016-02-11   (M)2018-06-17


The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.8CVSS Score : 7.2
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 5.9Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
SECTRACK-1034701
EXPLOIT-DB-39277
BID-81054
DSA-3448
FEDORA-2016-5d43766e33
FEDORA-2016-b59fd603be
HPSBHF03436
RHSA-2016:0064
RHSA-2016:0065
RHSA-2016:0068
SUSE-SU-2016:0205
SUSE-SU-2016:0341
SUSE-SU-2016:0745
SUSE-SU-2016:0746
SUSE-SU-2016:0747
SUSE-SU-2016:0750
SUSE-SU-2016:0751
SUSE-SU-2016:0752
SUSE-SU-2016:0753
SUSE-SU-2016:0755
SUSE-SU-2016:0756
SUSE-SU-2016:0757
USN-2870-1
USN-2870-2
USN-2871-1
USN-2871-2
USN-2872-1
USN-2872-2
USN-2872-3
USN-2873-1
http://www.openwall.com/lists/oss-security/2016/01/19/2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
http://source.android.com/security/bulletin/2016-03-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
https://bto.bluecoat.com/security-advisory/sa112
https://bugzilla.redhat.com/show_bug.cgi?id=1297475
https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://security.netapp.com/advisory/ntap-20160211-0001/

CPE    24
cpe:/o:google:android:5.1
cpe:/o:google:android:5.1.1
cpe:/o:google:android:5.1.0
cpe:/o:google:android:6.0
...
OVAL    23
oval:org.secpod.oval:def:1501350
oval:org.secpod.oval:def:1501318
oval:org.secpod.oval:def:110082
oval:org.secpod.oval:def:400704
...

© SecPod Technologies