Linux Kernel up to 4.5.x IP Stack IPv4 Packet resource consumption

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 4.5.x. The impacted element is an unknown function of the component IP Stack. This manipulation as part of IPv4 Packet causes resource consumption. This vulnerability is tracked as CVE-2016-8666. The attack is possible to be carried out remotely. No exploit exists. It is advisable to upgrade the affected component.
Details
A vulnerability classified as critical was found in Linux Kernel up to 4.5.x (Operating System). Affected by this vulnerability is an unknown functionality of the component IP Stack. The manipulation as part of a IPv4 Packet leads to a resource consumption vulnerability. The CWE definition for the vulnerability is CWE-400. The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.
The weakness was disclosed 10/16/2016 (Website). The advisory is shared at git.kernel.org. This vulnerability is known as CVE-2016-8666 since 10/14/2016. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1499 for this issue.
The vulnerability scanner Nessus provides a plugin with the ID 94682 (Amazon Linux AMI : kernel (ALAS-2016-762)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Amazon Linux Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 169287 (OpenSuSE Security Update for the Linux Kernel (openSUSE-SU-2016:2584-1) (Dirty Cow)).
Upgrading to version 4.6 eliminates this vulnerability. A possible mitigation has been published 4 weeks after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (94682) and SecurityFocus (BID 93562†). The entries VDB-92736, VDB-92735, VDB-92734 and VDB-92733 are pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource consumptionCWE: CWE-400 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 94682
Nessus Name: Amazon Linux AMI : kernel (ALAS-2016-762)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 900924
OpenVAS Name: SuSE Update for Kernel openSUSE-SU-2016:2584-1 (Kernel)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Kernel 4.6
Patch: git.kernel.org
Timeline
10/14/2016 🔍10/14/2016 🔍
10/16/2016 🔍
10/16/2016 🔍
10/17/2016 🔍
11/10/2016 🔍
11/11/2016 🔍
09/26/2022 🔍
Sources
Vendor: kernel.orgAdvisory: RHSA-2017:0372
Status: Not defined
Confirmation: 🔍
CVE: CVE-2016-8666 (🔍)
GCVE (CVE): GCVE-0-2016-8666
GCVE (VulDB): GCVE-100-92737
SecurityFocus: 93562 - Linux Kernel CVE-2016-8666 Stack Overflow Denial of Service Vulnerability
See also: 🔍
Entry
Created: 10/17/2016 10:27Updated: 09/26/2022 11:54
Changes: 10/17/2016 10:27 (70), 05/11/2019 07:56 (13), 09/26/2022 11:46 (5), 09/26/2022 11:54 (1)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.