Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2016-4997 CVE-2016-5829 CVE-2016-6480 |
CWE-ID | CWE-119 CWE-122 CWE-362 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Oracle Linux Operating systems & Components / Operating system Linux kernel Operating systems & Components / Operating system Oracle VM Server for x86 Server applications / Other server solutions |
Vendor |
Oracle Linux Foundation |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU27
Risk: High
CVSSv3.1: 8.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID: CVE-2016-4997
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to a memory corruption error in the IPT_SO_SET_REPLACE compat_setsockopt() function.
Successful exploitation of this vulnerability may lead to arbitrary code execution with kernel-level privileges.
Update the affected packages.
Oracle Linux: 5 - 7
Oracle VM Server for x86: 3.2
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU4080
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-5829
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.
The weakness exists in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c due to heap-based buffer overflow. A local attacker can cause the service to crash or gain elevated privileges via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
Update the affected packages.
Linux kernel: 4.6.0 - 4.6.2
CPE2.3 External linkshttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU359
Risk: Medium
CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-6480
Exploit availability: No
DescriptionThe vulnerability allows local users to provoke a denial of service.
The vulnerability exists due to parafunction of ioctl_send_fib. By altering "double fetch" vulnerability, a local user can provoke a denial of service.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service
MitigationUpdate the affected packages.
Oracle VM Server for x86: 3.2 - 3.4
Oracle Linux: 5 - 7
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.