← Retour aux CVEs
CVE-2016-8632
HIGH7.8
Description
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie11/28/2016
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
linux:linux_kernel
Faiblesses (CWE)
CWE-119CWE-264
References
http://www.openwall.com/lists/oss-security/2016/11/08/5(secalert@redhat.com)
http://www.securityfocus.com/bid/94211(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(secalert@redhat.com)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/11/08/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94211(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(af854a3a-2127-422b-91ae-364da2661108)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.