CVE-2016-8666

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fac8e0f579695a3ecbc4d3cac369139d7f819971

http://rhn.redhat.com/errata/RHSA-2016-2047.html

http://rhn.redhat.com/errata/RHSA-2016-2107.html

http://rhn.redhat.com/errata/RHSA-2016-2110.html

http://rhn.redhat.com/errata/RHSA-2017-0004.html

http://www.openwall.com/lists/oss-security/2016/10/13/11

http://www.securityfocus.com/bid/93562

https://access.redhat.com/errata/RHSA-2017:0372

https://bto.bluecoat.com/security-advisory/sa134

https://bugzilla.redhat.com/show_bug.cgi?id=1384991

https://bugzilla.suse.com/show_bug.cgi?id=1001486

https://github.com/torvalds/linux/commit/fac8e0f579695a3ecbc4d3cac369139d7f819971

Details

Source: MITRE

Published: 2016-10-16

Updated: 2018-01-05

Type: CWE-400

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.5.7 (inclusive)

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
124978EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1525)NessusHuawei Local Security Checks
high
124819EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1496)NessusHuawei Local Security Checks
critical
99848EulerOS 2.0 SP1 : kernel (EulerOS-SA-2017-1001)NessusHuawei Local Security Checks
critical
96603SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2017:0181-1)NessusSuSE Local Security Checks
high
96517OracleVM 3.4 : Unbreakable / etc (OVMSA-2017-0004)NessusOracleVM Local Security Checks
high
96477Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3508)NessusOracle Linux Local Security Checks
high
96307RHEL 7 : kernel (RHSA-2017:0004)NessusRed Hat Local Security Checks
high
95701openSUSE Security Update : the Linux Kernel (openSUSE-2016-1426)NessusSuSE Local Security Checks
critical
95368SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:2912-1)NessusSuSE Local Security Checks
high
94682Amazon Linux AMI : kernel (ALAS-2016-762)NessusAmazon Linux Local Security Checks
high
94316RHEL 7 : kernel-rt (RHSA-2016:2110) (Dirty COW)NessusRed Hat Local Security Checks
high
94315RHEL 6 : MRG (RHSA-2016:2107) (Dirty COW)NessusRed Hat Local Security Checks
high
94239openSUSE Security Update : the Linux Kernel (openSUSE-2016-1211) (Dirty COW)NessusSuSE Local Security Checks
high
94219openSUSE Security Update : the Linux Kernel (openSUSE-2016-1212) (Dirty COW)NessusSuSE Local Security Checks
high
93967CentOS 7 : kernel (CESA-2016:2047)NessusCentOS Local Security Checks
high
93952RHEL 7 : kernel (RHSA-2016:2047)NessusRed Hat Local Security Checks
high
93949Oracle Linux 7 : kernel (ELSA-2016-2047)NessusOracle Linux Local Security Checks
high