CVE-2016-7039

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.

References

http://rhn.redhat.com/errata/RHSA-2016-2047.html

http://rhn.redhat.com/errata/RHSA-2016-2107.html

http://rhn.redhat.com/errata/RHSA-2016-2110.html

http://www.openwall.com/lists/oss-security/2016/10/10/15

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html

http://www.securityfocus.com/bid/93476

https://access.redhat.com/errata/RHSA-2017:0372

https://bto.bluecoat.com/security-advisory/sa134

https://bugzilla.redhat.com/show_bug.cgi?id=1375944

https://patchwork.ozlabs.org/patch/680412/

Details

Source: MITRE

Published: 2016-10-16

Updated: 2019-12-27

Type: CWE-399

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
125100EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1494)NessusHuawei Local Security Checks
high
124974EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1521)NessusHuawei Local Security Checks
critical
96603SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2017:0181-1)NessusSuSE Local Security Checks
high
95701openSUSE Security Update : the Linux Kernel (openSUSE-2016-1426)NessusSuSE Local Security Checks
critical
95368SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:2912-1)NessusSuSE Local Security Checks
high
94682Amazon Linux AMI : kernel (ALAS-2016-762)NessusAmazon Linux Local Security Checks
high
94316RHEL 7 : kernel-rt (RHSA-2016:2110) (Dirty COW)NessusRed Hat Local Security Checks
high
94315RHEL 6 : MRG (RHSA-2016:2107) (Dirty COW)NessusRed Hat Local Security Checks
high
94239openSUSE Security Update : the Linux Kernel (openSUSE-2016-1211) (Dirty COW)NessusSuSE Local Security Checks
high
94219openSUSE Security Update : the Linux Kernel (openSUSE-2016-1212) (Dirty COW)NessusSuSE Local Security Checks
high
94065OracleVM 3.4 : Unbreakable / etc (OVMSA-2016-0140)NessusOracleVM Local Security Checks
high
94064Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2016-3626)NessusOracle Linux Local Security Checks
high
94003Scientific Linux Security Update : kernel on SL7.x x86_64 (20161010)NessusScientific Linux Local Security Checks
high
93967CentOS 7 : kernel (CESA-2016:2047)NessusCentOS Local Security Checks
high
93959Ubuntu 16.04 LTS : linux-snapdragon vulnerabilities (USN-3099-4)NessusUbuntu Local Security Checks
high
93958Ubuntu 16.04 LTS : linux-raspi2 vulnerabilities (USN-3099-3)NessusUbuntu Local Security Checks
high
93957Ubuntu 14.04 LTS : linux-lts-xenial vulnerabilities (USN-3099-2)NessusUbuntu Local Security Checks
high
93956Ubuntu 16.04 LTS : linux vulnerabilities (USN-3099-1)NessusUbuntu Local Security Checks
high
93955Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-3098-2)NessusUbuntu Local Security Checks
high
93954Ubuntu 14.04 LTS : linux vulnerabilities (USN-3098-1)NessusUbuntu Local Security Checks
high
93952RHEL 7 : kernel (RHSA-2016:2047)NessusRed Hat Local Security Checks
high
93949Oracle Linux 7 : kernel (ELSA-2016-2047)NessusOracle Linux Local Security Checks
high