CVE-2016-2782

Published on: 04/27/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:16 PM UTC

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Linux Kernel from Linux contain the following vulnerability:

The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.

  • CVE-2016-2782 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 4.6 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
PHYSICAL LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.9 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE COMPLETE

CVE References

Description Tags Link
USN-2929-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2929-2
USN-2967-2: Linux kernel (OMAP4) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2967-2
[security-announce] SUSE-SU-2016:1707-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1707
1312670 – (CVE-2016-2782) CVE-2016-2782 kernel: visor: crash on invalid USB device descriptors in treo_attach() in visor driver Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1312670
USN-2930-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2930-3
USB: visor: fix null-deref at probe · torvalds/[email protected] · GitHub Vendor Advisory
github.com
text/html
URL Logo CONFIRM github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
USN-2948-2: Linux kernel (Utopic HWE) regression | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2948-2
USN-2930-1: Linux kernel vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2930-1
USN-2930-2: Linux kernel (Wily HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2930-2
[security-announce] SUSE-SU-2016:2074-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:2074
[security-announce] SUSE-SU-2016:1672-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1672
Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference - Linux dos Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39539
USN-2948-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2948-1
kernel/git/torvalds/linux.git - Linux kernel source tree Vendor Advisory
git.kernel.org
text/html
URL Logo CONFIRM git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
[security-announce] SUSE-SU-2016:1764-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1764
USN-2932-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2932-1
USN-2967-1: Linux kernel vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2967-1
oss-security - Re: CVE request -- linux kernel: visor: crash on invalid USB device descriptors in treo_attach() in visor driver www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160228 Re: CVE request -- linux kernel: visor: crash on invalid USB device descriptors in treo_attach() in visor driver
[security-announce] SUSE-SU-2016:1690-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1690
[security-announce] SUSE-SU-2016:1019-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1019
USN-2929-1: Linux kernel vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2929-1

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
LinuxLinux KernelAllrc7AllAll
Operating
System
NovellSuse Linux Enterprise Debuginfo11sp4AllAll
Operating
System
NovellSuse Linux Enterprise Debuginfo11sp4AllAll
Operating
System
NovellSuse Linux Enterprise Desktop12.0AllAllAll
Operating
System
NovellSuse Linux Enterprise Desktop12.0AllAllAll
Operating
System
NovellSuse Linux Enterprise Live Patching12AllAllAll
Operating
System
NovellSuse Linux Enterprise Live Patching12AllAllAll
Operating
System
NovellSuse Linux Enterprise Module For Public Cloud12AllAllAll
Operating
System
NovellSuse Linux Enterprise Module For Public Cloud12AllAllAll
Operating
System
NovellSuse Linux Enterprise Real Time Extension11sp4AllAll
Operating
System
NovellSuse Linux Enterprise Real Time Extension12sp1AllAll
Operating
System
NovellSuse Linux Enterprise Real Time Extension11sp4AllAll
Operating
System
NovellSuse Linux Enterprise Real Time Extension12sp1AllAll
Operating
System
NovellSuse Linux Enterprise Server11extraAllAll
Operating
System
NovellSuse Linux Enterprise Server11sp4AllAll
Operating
System
NovellSuse Linux Enterprise Server12.0AllAllAll
Operating
System
NovellSuse Linux Enterprise Server11extraAllAll
Operating
System
NovellSuse Linux Enterprise Server11sp4AllAll
Operating
System
NovellSuse Linux Enterprise Server12.0AllAllAll
Operating
System
NovellSuse Linux Enterprise Software Development Kit11.0sp4AllAll
Operating
System
NovellSuse Linux Enterprise Software Development Kit12AllAllAll
Operating
System
NovellSuse Linux Enterprise Software Development Kit11.0sp4AllAll
Operating
System
NovellSuse Linux Enterprise Software Development Kit12AllAllAll
Operating
System
NovellSuse Linux Enterprise Workstation Extension12AllAllAll
Operating
System
NovellSuse Linux Enterprise Workstation Extension12AllAllAll
  • cpe:2.3:o:linux:linux_kernel:*:rc7:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_server:11:extra:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_server:11:extra:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*: