← Back to CVEs
CVE-2016-8399
HIGH7.0
Description
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
CVE Details
CVSS v3.1 Score7.0
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredNONE
User InteractionREQUIRED
Published1/12/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
linux:linux_kernel
Weaknesses (CWE)
CWE-284
References
http://rhn.redhat.com/errata/RHSA-2017-0817.html(security@android.com)
http://www.securityfocus.com/bid/94708(security@android.com)
https://access.redhat.com/errata/RHSA-2017:0869(security@android.com)
https://access.redhat.com/errata/RHSA-2017:2930(security@android.com)
https://access.redhat.com/errata/RHSA-2017:2931(security@android.com)
https://source.android.com/security/bulletin/2016-12-01.html(security@android.com)
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS(security@android.com)
http://rhn.redhat.com/errata/RHSA-2017-0817.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94708(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0869(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2930(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2931(af854a3a-2127-422b-91ae-364da2661108)
https://source.android.com/security/bulletin/2016-12-01.html(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.