vendor:
Linux Kernel
by:
Qian Zhang
7.8
CVSS
HIGH
Local Privilege Escalation
269
CWE
Product Name: Linux Kernel
Affected Version From: Linux kernel <= 4.6.2
Affected Version To: Linux kernel <= 4.6.2
Patch Exists: YES
Related CWE: CVE-2016-4997
CPE: o:linux:linux_kernel
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-usn-3338-2/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-4997/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-4997/
Platforms Tested: Ubuntu 16.04.1 LTS Linux 4.4.0-21-generic
2016
Linux kernel <= 4.6.2 - Local Privileges Escalation via IP6T_SO_SET_REPLACE compat setsockopt call
The IPv6 netfilter subsystem in the Linux kernel through 4.6.2 does not validate certain offset fields, which allows local users to escalate privileges via an IP6T_SO_SET_REPLACE compat setsockopt call with ip6_tables module loaded.
Mitigation:
Apply the patch provided by the vendor.