// For flags

CVE-2016-2384

Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-midi SMEP Privilege Escalation

Severity Score

4.6
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.

Vulnerabilidad de liberación doble en la función snd_usbmidi_create en sound/usb/midi.c en el kernel de Linux en versiones anteriores a 4.5 permite a atacantes físicamente próximos causar una denegación de servicio (pánico) o posiblemente tener otro impacto no especificado a través de vectores que implican un descriptor USB inválido.

A flaw was found in the USB-MIDI Linux kernel driver: a double-free error could be triggered for the 'umidi' object. An attacker with physical access to the system could use this flaw to escalate their privileges.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
Attack Vector
Local
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-02-14 CVE Reserved
  • 2016-02-22 First Exploit
  • 2016-03-04 CVE Published
  • 2023-11-10 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-416: Use After Free
CAPEC
References (40)
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html 2018-01-05
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2016-2574.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2016-2584.html 2018-01-05
http://rhn.redhat.com/errata/RHSA-2017-0817.html 2018-01-05
http://www.debian.org/security/2016/dsa-3503 2018-01-05
http://www.ubuntu.com/usn/USN-2928-1 2018-01-05
http://www.ubuntu.com/usn/USN-2928-2 2018-01-05
http://www.ubuntu.com/usn/USN-2929-1 2018-01-05
http://www.ubuntu.com/usn/USN-2929-2 2018-01-05
http://www.ubuntu.com/usn/USN-2930-1 2018-01-05
http://www.ubuntu.com/usn/USN-2930-2 2018-01-05
http://www.ubuntu.com/usn/USN-2930-3 2018-01-05
http://www.ubuntu.com/usn/USN-2931-1 2018-01-05
http://www.ubuntu.com/usn/USN-2932-1 2018-01-05
https://bugzilla.redhat.com/show_bug.cgi?id=1308444 2017-03-21
https://access.redhat.com/security/cve/CVE-2016-2384 2017-03-21
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
<= 4.4.8
Search vendor "Linux" for product "Linux Kernel" and version " <= 4.4.8"
-
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Real Time Extension
Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension"
12
Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" and version "12"
sp1
Affected