CVE-2016-10200
kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
Condición de carrera en la característica L2TPv3 IP Encapsulation en el kernel de Linux en versiones anteriores a 4.8.14 permite a usuarios locales obtener privilegios o provocar una denegación de servicio (uso después de liberación) realizando múltiples llamadas al sistema enlazadas sin comprobar adecuadamente si un socket tiene el estatus SOCK_ZAPPED, relacionado con net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
A use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-02-04 CVE Reserved
- 2017-03-07 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
- CWE-416: Use After Free
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://source.android.com/security/bulletin/2017-03-01.html | Third Party Advisory | |
http://www.securityfocus.com/bid/101783 | Third Party Advisory | |
http://www.securitytracker.com/id/1037965 | Third Party Advisory | |
http://www.securitytracker.com/id/1037968 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14 | 2023-06-07 | |
https://access.redhat.com/errata/RHSA-2017:1842 | 2023-06-07 | |
https://access.redhat.com/errata/RHSA-2017:2077 | 2023-06-07 | |
https://access.redhat.com/errata/RHSA-2017:2437 | 2023-06-07 | |
https://access.redhat.com/errata/RHSA-2017:2444 | 2023-06-07 | |
https://access.redhat.com/security/cve/CVE-2016-10200 | 2017-08-08 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1430347 | 2017-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.0.34 < 3.2 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.0.34 < 3.2" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.2.20 < 3.2.88 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.2.20 < 3.2.88" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.4.2 < 3.12.69 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.4.2 < 3.12.69" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.13 < 3.16.40 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 < 3.16.40" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.17 < 3.18.52 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.17 < 3.18.52" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.19 < 4.4.38 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.19 < 4.4.38" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.5 < 4.8.14 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.5 < 4.8.14" | - |
Affected
| ||||||
Google Search vendor "Google" | Android Search vendor "Google" for product "Android" | <= 7.1.1 Search vendor "Google" for product "Android" and version " <= 7.1.1" | - |
Affected
|