CVE-2016-4557
Linux Kernel 4.4 (Ubuntu 16.04) - 'BPF' Local Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
La función replace_map_fd_with_map_ptr en kernel/bpf/verifier.c en el kernel de Linux en versiones anteriores a 4.5.5 no mantiene correctamente una estructura de datos fd, lo que permite a usuarios locales obtener privilegios o provocar una denegación de servicio (uso después de liberación de memoria) a través de instrucciones BPF manipuladas que hacen referencia a un archivo descriptor incorrecto.
Linux kernel versions 4.4 and above where CONFIG_BPF_SYSCALL and kernel.unprivileged_bpf_disabled sysctl is not set to 1 allow for BPF to be abused for privilege escalation. Ubuntu 16.04 has all of these conditions met.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-05-03 CVE Published
- 2016-05-04 First Exploit
- 2016-05-06 CVE Reserved
- 2023-05-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (15)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/40759 | 2024-08-06 | |
https://www.exploit-db.com/exploits/39772 | 2016-05-04 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.4 < 4.4.11 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.4 < 4.4.11" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.5 < 4.5.5 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.5 < 4.5.5" | - |
Affected
|