[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2016-8655Date: (C)2016-12-14   (M)2018-02-19


Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : 7.8CVSS Score  : 7.2
Exploit Score: 1.8Exploit Score: 3.9
Impact Score : 5.9Impact Score : 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  





Reference:
SECTRACK-1037403
SECTRACK-1037968
EXPLOIT-DB-40871
BID-94692
RHSA-2017:0386
RHSA-2017:0387
RHSA-2017:0402
SUSE-SU-2016:3096
SUSE-SU-2016:3113
SUSE-SU-2016:3116
SUSE-SU-2016:3117
SUSE-SU-2016:3169
SUSE-SU-2016:3183
SUSE-SU-2016:3197
SUSE-SU-2016:3205
SUSE-SU-2016:3206
SUSE-SU-2016:3247
USN-3149-1
USN-3149-2
USN-3150-1
USN-3150-2
USN-3151-1
USN-3151-2
USN-3151-3
USN-3151-4
USN-3152-1
USN-3152-2
http://www.openwall.com/lists/oss-security/2016/12/06/1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html
https://bugzilla.redhat.com/show_bug.cgi?id=1400019
https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c
https://source.android.com/security/bulletin/2017-03-01.html

CWE    1
CWE-416
OVAL    24
oval:org.secpod.oval:def:1501728
oval:org.secpod.oval:def:1501731
oval:org.secpod.oval:def:1501735
oval:org.secpod.oval:def:1501733
...

© 2013 SecPod Technologies