← Zuruck zu CVEs
CVE-2016-8632
HIGH7.8
Beschreibung
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht11/28/2016
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
linux:linux_kernel
Schwachen (CWE)
CWE-119CWE-264
Referenzen
http://www.openwall.com/lists/oss-security/2016/11/08/5(secalert@redhat.com)
http://www.securityfocus.com/bid/94211(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(secalert@redhat.com)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/11/08/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94211(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(af854a3a-2127-422b-91ae-364da2661108)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.