CVE-2016-3841

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39

http://rhn.redhat.com/errata/RHSA-2016-0855.html

http://rhn.redhat.com/errata/RHSA-2016-2574.html

http://rhn.redhat.com/errata/RHSA-2016-2584.html

http://rhn.redhat.com/errata/RHSA-2016-2695.html

http://source.android.com/security/bulletin/2016-08-01.html

http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3

http://www.securityfocus.com/bid/92227

https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39

Details

Source: MITRE

Published: 2016-08-06

Updated: 2018-01-05

Type: CWE-264

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.3

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.3.2 (inclusive)

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
124976EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1523)NessusHuawei Local Security Checks
critical
124816EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1492)NessusHuawei Local Security Checks
critical
120977Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4316)NessusOracle Linux Local Security Checks
high
99846EulerOS 2.0 SP1 : kernel (EulerOS-SA-2016-1089)NessusHuawei Local Security Checks
high
97297SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0494-1)NessusSuSE Local Security Checks
critical
96903SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0333-1)NessusSuSE Local Security Checks
critical
95841Scientific Linux Security Update : kernel on SL7.x x86_64 (20161103)NessusScientific Linux Local Security Checks
critical
95536SUSE SLES11 Security Update : kernel (SUSE-SU-2016:2976-1)NessusSuSE Local Security Checks
critical
95321CentOS 7 : kernel (CESA-2016:2574)NessusCentOS Local Security Checks
critical
94697Oracle Linux 7 : kernel (ELSA-2016-2574)NessusOracle Linux Local Security Checks
critical
94667RHEL 7 : kernel (RHSA-2016:2695)NessusRed Hat Local Security Checks
high
94547RHEL 7 : kernel-rt (RHSA-2016:2584)NessusRed Hat Local Security Checks
critical
94537RHEL 7 : kernel (RHSA-2016:2574)NessusRed Hat Local Security Checks
critical
93603Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-3083-2)NessusUbuntu Local Security Checks
high
93602Ubuntu 14.04 LTS : linux vulnerabilities (USN-3083-1)NessusUbuntu Local Security Checks
high
91210Oracle Linux 6 : kernel (ELSA-2016-0855)NessusOracle Linux Local Security Checks
high
91170CentOS 6 : kernel (CESA-2016:0855)NessusCentOS Local Security Checks
high
91077RHEL 6 : kernel (RHSA-2016:0855)NessusRed Hat Local Security Checks
high