← Back to CVEs
CVE-2016-8632
HIGH7.8
Description
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published11/28/2016
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
linux:linux_kernel
Weaknesses (CWE)
CWE-119CWE-264
References
http://www.openwall.com/lists/oss-security/2016/11/08/5(secalert@redhat.com)
http://www.securityfocus.com/bid/94211(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(secalert@redhat.com)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/11/08/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94211(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(af854a3a-2127-422b-91ae-364da2661108)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.