CVE-2016-3136
Published on: 05/02/2016 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:01 PM UTC
Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:
The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
- CVE-2016-3136 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.6 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
PHYSICAL | LOW | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4.9 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[security-announce] openSUSE-SU-2016:1382-1: important: Security update | lists.opensuse.org text/html |
![]() |
USN-2971-2: Linux kernel (Wily HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
Bug 1283370 – CVE-2016-3136 Local RedHat Enterprise Linux DoS – RHEL 7.1 Kernel crashes on invalid USB device descriptors (mct_u232 driver) [local-DoS] | Issue Tracking Third Party Advisory VDB Entry bugzilla.redhat.com text/html |
![]() |
USN-3000-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
kernel/git/torvalds/linux.git - Linux kernel source tree | Vendor Advisory git.kernel.org text/html |
![]() |
USN-2968-1: Linux kernel vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
1317007 – (CVE-2016-3136) CVE-2016-3136 kernel: Crash on invalid USB device descriptors (mct_u232 driver) | Issue Tracking Third Party Advisory VDB Entry bugzilla.redhat.com text/html |
![]() |
Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'mct_u232' Nullpointer Dereference - Linux dos Exploit | www.exploit-db.com Proof of Concept text/html |
![]() |
USN-2970-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
USN-2968-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
Debian -- Security Information -- DSA-3607-1 linux | www.debian.org Depreciated Link text/html |
![]() |
USN-2996-1: Linux kernel vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
Linux Kernel 'mct_u232.c' Local Denial of Service Vulnerability | cve.report (archive) text/html |
![]() |
USN-2971-1: Linux kernel vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
oss-security - Re: CVE request -- linux kernel: crash on invalid USB device descriptors (mct_u232 driver) | www.openwall.com text/html |
![]() |
[security-announce] SUSE-SU-2016:1764-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1690-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
[security-announce] SUSE-SU-2016:1696-1: important: Security update for | Third Party Advisory lists.opensuse.org text/html |
![]() |
Vendor Advisory www.kernel.org text/plain |
![]() | |
USN-2997-1: Linux kernel (OMAP4) vulnerabilities | Ubuntu | Third Party Advisory www.ubuntu.com text/html |
![]() |
USN-2971-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu | www.ubuntu.com text/html |
![]() |
USB: mct_u232: add sanity checking in probe · torvalds/[email protected] · GitHub | github.com text/html |
![]() |
Known Affected Configurations (CPE V2.3)
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*:
- cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE