7.8

CVE-2016-1583

Exploit

The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.6.19 < 3.18.54
LinuxLinux Kernel Version >= 3.19 < 4.4.14
LinuxLinux Kernel Version >= 4.5 < 4.6.3
NovellSuse Linux Enterprise Debuginfo Version11.0 Updatesp4
NovellSuse Linux Enterprise Desktop Version12.0 Updatesp1
NovellSuse Linux Enterprise Server Version11.0 Updateextra
NovellSuse Linux Enterprise Server Version11.0 Updatesp4
NovellSuse Linux Enterprise Server Version12.0 Updatesp1
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionesm
DebianDebian Linux Version8.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.25% 0.483
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://www.securitytracker.com/id/1036763
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/91157
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/39992/
Third Party Advisory
Exploit
VDB Entry