Unknown
CVE-2016-4997
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2016-4997
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- canonical,
- debian,
- linux,
- novell,
- oracle
Products
- debian linux 8.0,
- linux 7,
- linux kernel,
- suse linux enterprise desktop 12.0,
- suse linux enterprise live patching 12.0,
- suse linux enterprise module for public cloud 12.0,
- suse linux enterprise real time extension 12.0,
- suse linux enterprise server 12.0,
- suse linux enterprise software development kit 12.0,
- suse linux enterprise workstation extension 12.0,
- ubuntu linux 12.04,
- ubuntu linux 14.04,
- ubuntu linux 15.10,
- ubuntu linux 16.04
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: