TROYANOSYVIRUS
Volver a CVEs

CVE-2016-5195

HIGHCISA KEV
7.0

Descripcion

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

Detalles CVE

Puntuacion CVSS v3.17.0
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadHIGH
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado11/10/2016
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorLinux
ProductoKernel
Nombre vulnerabilidadLinux Kernel Race Condition Vulnerability
Fecha inclusion KEV2022-03-03
Fecha limite remediacion2022-03-24
Uso en ransomwareUnknown

Productos afectados

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoralinux:linux_kernelnetapp:cloud_backupnetapp:hci_storage_nodesnetapp:oncommand_balancenetapp:oncommand_performance_managernetapp:oncommand_unified_manager_for_clustered_data_ontapnetapp:ontap_select_deploy_administration_utilitynetapp:snapprotectnetapp:solidfirepaloaltonetworks:pan-osredhat:enterprise_linuxredhat:enterprise_linux_ausredhat:enterprise_linux_eusredhat:enterprise_linux_long_liferedhat:enterprise_linux_tus

Debilidades (CWE)

CWE-362CWE-362

Referencias

http://fortiguard.com/advisory/FG-IR-16-063(chrome-cve-admin@google.com)
http://www.securityfocus.com/bid/93793(chrome-cve-admin@google.com)
http://www.securitytracker.com/id/1037078(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3104-1(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3104-2(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3105-1(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3105-2(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3106-1(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3106-2(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3106-3(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3106-4(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3107-1(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-3107-2(chrome-cve-admin@google.com)
https://dirtycow.ninja(chrome-cve-admin@google.com)
https://www.exploit-db.com/exploits/40611/(chrome-cve-admin@google.com)
https://www.exploit-db.com/exploits/40616/(chrome-cve-admin@google.com)
https://www.exploit-db.com/exploits/40839/(chrome-cve-admin@google.com)
https://www.exploit-db.com/exploits/40847/(chrome-cve-admin@google.com)
https://www.kb.cert.org/vuls/id/243144(chrome-cve-admin@google.com)
http://fortiguard.com/advisory/FG-IR-16-063(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2098.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2105.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2106.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2107.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2110.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2118.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2120.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2124.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2126.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2127.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2128.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2132.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-2133.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2024/Aug/35(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3696(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/10/21/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/10/26/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/10/27/13(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/10/30/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/11/03/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/03/07/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/08/08/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/08/08/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/08/08/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/08/08/8(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/08/09/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2022/08/15/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/93793(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037078(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3104-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3104-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3105-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3105-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3106-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3106-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3106-3(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3106-4(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3107-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3107-2(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0372(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/cve-2016-5195(af854a3a-2127-422b-91ae-364da2661108)
https://bto.bluecoat.com/security-advisory/sa134(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1384344(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=1004418(af854a3a-2127-422b-91ae-364da2661108)
https://dirtycow.ninja(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs(af854a3a-2127-422b-91ae-364da2661108)
https://security-tracker.debian.org/tracker/CVE-2016-5195(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20161025-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://security.paloaltonetworks.com/CVE-2016-5195(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40611/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40616/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40839/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40847/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/243144(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.