CVE-2016-3707

Published on: 06/27/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:03 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Linux Kernel-rt from Linux contain the following vulnerability:

The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.

  • CVE-2016-3707 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1301
[security-announce] SUSE-SU-2016:1937-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1937
oss-security - CVE-2016-3707 : kernel-rt - Sending SysRq command via ICMP echo request www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160517 CVE-2016-3707 : kernel-rt - Sending SysRq command via ICMP echo request
[security-announce] SUSE-SU-2016:1985-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1985
1327484 – (CVE-2016-3707) CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1327484
[security-announce] SUSE-SU-2016:1764-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1764
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1341

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
LinuxLinux Kernel-rtAllAllAllAll
Operating
System
NovellSuse Linux Enterprise Real Time Extension12.0sp1AllAll
Operating
System
NovellSuse Linux Enterprise Real Time Extension12.0sp1AllAll
Operating
System
RedhatEnterprise Linux For Real Time7AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time7AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time For Nfv7AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time For Nfv7AllAllAll
  • cpe:2.3:o:linux:linux_kernel-rt:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*: