Vulnerability Details : CVE-2016-9793
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2016-9793
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9793
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9793
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-9793
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9793
-
https://access.redhat.com/errata/RHSA-2017:0933
RHSA-2017:0933 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:0931
RHSA-2017:0931 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
kernel-exploits/CVE-2016-9793 at master · xairy/kernel-exploits · GitHubThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1402013
1402013 – (CVE-2016-9793) CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCEIssue Tracking;Third Party Advisory
-
https://github.com/torvalds/linux/commit/b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
net: avoid signed overflows for SO_{SND|RCV}BUFFORCE · torvalds/linux@b98b0bc · GitHubPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/94655
Linux Kernel 'net/core/sock.c' Multiple Local Memory Corruption VulnerabilitiesThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:0932
RHSA-2017:0932 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://source.android.com/security/bulletin/2017-03-01.html
Android Security Bulletin—March 2017 | Android Open Source ProjectThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/12/03/1
oss-security - Re: CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCEMailing List;Patch;Third Party Advisory
-
http://www.securitytracker.com/id/1037968
Android Multiple Flaws Let Users Deny Service, Obtain Potentially Sensitive Information, and Gain Elevated Privileges and Let Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
Release Notes;Vendor Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
Jump to