← Voltar para CVEs
CVE-2016-8399
HIGH7.0
Descricao
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
Detalhes CVE
Pontuacao CVSS v3.17.0
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado1/12/2017
Ultima modificacao4/20/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernel
Fraquezas (CWE)
CWE-284
Referencias
http://rhn.redhat.com/errata/RHSA-2017-0817.html(security@android.com)
http://www.securityfocus.com/bid/94708(security@android.com)
https://access.redhat.com/errata/RHSA-2017:0869(security@android.com)
https://access.redhat.com/errata/RHSA-2017:2930(security@android.com)
https://access.redhat.com/errata/RHSA-2017:2931(security@android.com)
https://source.android.com/security/bulletin/2016-12-01.html(security@android.com)
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS(security@android.com)
http://rhn.redhat.com/errata/RHSA-2017-0817.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94708(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0869(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2930(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2931(af854a3a-2127-422b-91ae-364da2661108)
https://source.android.com/security/bulletin/2016-12-01.html(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.