CVE-2016-2188
Published on: 05/02/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:16 PM UTC
Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:
The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
- CVE-2016-2188 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.6 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
PHYSICAL | LOW | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4.9 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[security-announce] openSUSE-SU-2016:1382-1: important: Security update | lists.opensuse.org text/html |
![]() |
USN-2969-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
1317018 – (CVE-2016-2188) CVE-2016-2188 kernel: Kernel panic on invalid USB device descriptor (iowarrior driver) | Issue Tracking Third Party Advisory VDB Entry bugzilla.redhat.com text/html |
![]() |
[security-announce] SUSE-SU-2016:1707-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
USN-2971-2: Linux kernel (Wily HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
USN-2968-1: Linux kernel vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
kernel/git/torvalds/linux.git - Linux kernel source tree | Vendor Advisory git.kernel.org text/html |
![]() |
Linux Kernel 3.10.0-229.x RHEL 7.1 / CentOS - iowarrior driver Crash PoC | www.exploit-db.com Proof of Concept text/html |
![]() |
[security-announce] SUSE-SU-2016:2074-1: important: Security update for | lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1672-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
USN-2970-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
USN-2968-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
No Description Provided | Third Party Advisory VDB Entry seclists.org text/html |
![]() |
USB: iowarrior: fix oops with malicious USB descriptors · torvalds/[email protected] · GitHub | Vendor Advisory github.com text/html |
![]() |
USN-2996-1: Linux kernel vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
USN-2971-1: Linux kernel vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
[security-announce] SUSE-SU-2016:1764-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1690-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1696-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
Bugtraq: oss-2016-15: Local RedHat Enterprise Linux DoS – RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver) | Exploit Third Party Advisory VDB Entry seclists.org text/html |
![]() |
www.kernel.org text/plain |
![]() | |
USN-2997-1: Linux kernel (OMAP4) vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
USN-2971-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE