← Zuruck zu CVEs
CVE-2016-8399
HIGH7.0
Beschreibung
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
CVE Details
CVSS v3.1 Bewertung7.0
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatHIGH
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht1/12/2017
Zuletzt geandert4/20/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
linux:linux_kernel
Schwachen (CWE)
CWE-284
Referenzen
http://rhn.redhat.com/errata/RHSA-2017-0817.html(security@android.com)
http://www.securityfocus.com/bid/94708(security@android.com)
https://access.redhat.com/errata/RHSA-2017:0869(security@android.com)
https://access.redhat.com/errata/RHSA-2017:2930(security@android.com)
https://access.redhat.com/errata/RHSA-2017:2931(security@android.com)
https://source.android.com/security/bulletin/2016-12-01.html(security@android.com)
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS(security@android.com)
http://rhn.redhat.com/errata/RHSA-2017-0817.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94708(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0869(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2930(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2931(af854a3a-2127-422b-91ae-364da2661108)
https://source.android.com/security/bulletin/2016-12-01.html(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.