Think you have a false positive on this rule?

Sid 1-37437

Message

OS-LINUX Linux Kernel keyring object exploit download attempt

Summary

The joinsessionkeyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

Impact

CVSS base score 7.8 CVSS impact score 5.9 CVSS exploitability score 1.8 confidentialityImpact HIGH integrityImpact HIGH availabilityImpact HIGH

CVE-2016-0728:

CVSS base score 7.8

CVSS impact score 5.9

CVSS exploitability score 1.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2016-0728: The joinsessionkeyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

Affected systems

  • hp servermigrationpack 7.5
  • google android 4.0
  • google android 4.0.1
  • google android 4.0.2
  • google android 4.0.3
  • google android 4.0.4
  • google android 4.1
  • google android 4.1.2
  • google android 4.2
  • google android 4.2.1
  • google android 4.2.2
  • google android 4.3
  • google android 4.3.1
  • google android 4.4
  • google android 4.4.1
  • google android 4.4.2
  • google android 4.4.3
  • google android 5.0
  • google android 5.0.1
  • google android 5.0.2
  • google android 5.1
  • google android 5.1.0
  • google android 5.1.1
  • google android 6.0
  • google android 6.0.1
  • linux linux_kernel 4.4

Ease of attack

CVE-2016-0728:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References