← Voltar para CVEs
CVE-2016-8632
HIGH7.8
Descricao
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado11/28/2016
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernel
Fraquezas (CWE)
CWE-119CWE-264
Referencias
http://www.openwall.com/lists/oss-security/2016/11/08/5(secalert@redhat.com)
http://www.securityfocus.com/bid/94211(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(secalert@redhat.com)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/11/08/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94211(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1390832(af854a3a-2127-422b-91ae-364da2661108)
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.