Vulnerability Details : CVE-2016-6522
Integer overflow in the uvm_map_isavail function in uvm/uvm_map.c in OpenBSD 5.9 allows local users to cause a denial of service (kernel panic) via a crafted mmap call, which triggers the new mapping to overlap with an existing mapping.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2016-6522
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-6522
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2016-6522
-
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6522
-
http://www.openwall.com/lists/oss-security/2016/08/02/8
oss-security - CVE Request: Denial-of-Service / Unexploitable Memory Corruption in mmap() on OpenBSDExploit;Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/92264
OpenBSD CVE-2016-6522 Integer Overflow Vulnerability
-
http://www.openwall.com/lists/oss-security/2016/08/02/12
oss-security - Re: CVE Request: Denial-of-Service / Unexploitable Memory Corruption in mmap() on OpenBSDExploit;Mailing List;Third Party Advisory
-
http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/023_uvmisavail.patch.sig
Patch
Products affected by CVE-2016-6522
- cpe:2.3:o:openbsd:openbsd:5.9:*:*:*:*:*:*:*