CVE-2016-8632

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

References

http://www.openwall.com/lists/oss-security/2016/11/08/5

http://www.securityfocus.com/bid/94211

https://bugzilla.redhat.com/show_bug.cgi?id=1390832

https://www.mail-archive.com/[email protected]/msg133205.html

Details

Source: MITRE

Published: 2016-11-28

Updated: 2016-11-28

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.8.11 (inclusive)

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
125101EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1513)NessusHuawei Local Security Checks
critical
104322Ubuntu 14.04 LTS : linux vulnerabilities (USN-3470-1)NessusUbuntu Local Security Checks
high
100665Ubuntu 14.04 LTS : linux-lts-xenial vulnerabilities (USN-3312-2)NessusUbuntu Local Security Checks
critical
100664Ubuntu 16.04 LTS : linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerabilities (USN-3312-1)NessusUbuntu Local Security Checks
critical
99162OracleVM 3.4 : Unbreakable / etc (OVMSA-2017-0056)NessusOracleVM Local Security Checks
critical
99159Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3533)NessusOracle Linux Local Security Checks
critical
97297SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0494-1)NessusSuSE Local Security Checks
critical
97098Ubuntu 16.10 : linux-raspi2 vulnerabilities (USN-3190-2)NessusUbuntu Local Security Checks
critical
97097SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0437-1)NessusSuSE Local Security Checks
critical
97018Ubuntu 16.10 : linux vulnerabilities (USN-3190-1)NessusUbuntu Local Security Checks
critical
96903SUSE SLES11 Security Update : kernel (SUSE-SU-2017:0333-1)NessusSuSE Local Security Checks
critical
96762SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0268-1)NessusSuSE Local Security Checks
high
96702SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0249-1)NessusSuSE Local Security Checks
high
96701SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0248-1)NessusSuSE Local Security Checks
high
96700SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0247-1)NessusSuSE Local Security Checks
high
96699SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0246-1)NessusSuSE Local Security Checks
high
96698SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0245-1)NessusSuSE Local Security Checks
high
96697SUSE SLES12 Security Update : kernel (SUSE-SU-2017:0244-1)NessusSuSE Local Security Checks
high
95708openSUSE Security Update : the Linux Kernel (openSUSE-2016-1436)NessusSuSE Local Security Checks
critical
95701openSUSE Security Update : the Linux Kernel (openSUSE-2016-1426)NessusSuSE Local Security Checks
critical
95660SUSE SLES12 Security Update : kernel (SUSE-SU-2016:3063-1)NessusSuSE Local Security Checks
critical
95628SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:3049-1)NessusSuSE Local Security Checks
critical
95606SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:3039-1)NessusSuSE Local Security Checks
critical