CVE-2016-8632

CVSS v3.1 7.8 (High)
78% Progress
CVSS v2.0 7.2 (High)
72% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 1
Advisories 32

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

Weaknesses
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-264
Permissions, Privileges, and Access Controls
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2016-11-28 03:59:04
(7 years ago)
Updated Date
2023-02-12 23:26:12
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 2.6.16 version and prior 3.2.85 version cpe:2.3:o:linux:linux_kernel >= 2.6.16 < 3.2.85
  Linux Kernel from 3.3 version and prior 3.16.40 version cpe:2.3:o:linux:linux_kernel >= 3.3 < 3.16.40
  Linux Kernel from 3.17 version and prior 4.1.37 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 4.1.37
  Linux Kernel from 4.2 version and prior 4.4.65 version cpe:2.3:o:linux:linux_kernel >= 4.2 < 4.4.65
  Linux Kernel from 4.5 version and prior 4.8.14 version cpe:2.3:o:linux:linux_kernel >= 4.5 < 4.8.14
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...