vendor:
Linux Kernel
by:
Anonymous
7,8
CVSS
HIGH
Dirty COW (CVE-2016-5195)
264
CWE
Product Name: Linux Kernel
Affected Version From: Linux Kernel 2.6.22
Affected Version To: Linux Kernel 4.8.3
Patch Exists: YES
Related CWE: CVE-2016-5195
CPE: o:linux:linux_kernel
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/panos-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/cisco-nx-os-cisco-sa-20161026-linux/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7702/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7701/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2015-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-5219/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-5195/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7692/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-5219/, https://www.rapid7.com/db/?q=CVE-2016-5195&type=&page=2, https://www.rapid7.com/db/?q=CVE-2016-5195&type=&page=3, https://www.rapid7.com/db/?q=CVE-2016-5195&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2016
DirtyCow root privilege escalation
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel. It exploits a race condition in the way the Linux kernel's memory subsystem handles copy-on-write (COW) breakage of private read-only memory mappings. This vulnerability allows an attacker to gain root access on the vulnerable system.
Mitigation:
The best way to mitigate the risk of Dirty COW is to ensure that all systems are running the latest version of the Linux kernel. Additionally, system administrators should ensure that all systems are running the latest security patches.