Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
8.4HIGH
EPSS
0.0%
top 86.93%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 27
Latest updateMay 14

Description

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.5 | Impact: 5.9

Affected Packages14 packages

Debianlinux< 4.5.1-1+3
Ubuntulinux< 3.13.0-83.127
Ubuntulinux-lts-wily< 4.2.0-34.39~14.04.1
Ubuntulinux-lts-vivid< 3.19.0-56.62~14.04.1

🔴Vulnerability Details

7
GHSA
GHSA-ggq9-w3hj-q2jf: The netfilter subsystem in the Linux kernel through 42022-05-14
CVEList
CVE-2016-3134: The netfilter subsystem in the Linux kernel through 42016-04-27
OSV
CVE-2016-3134: The netfilter subsystem in the Linux kernel through 42016-04-27
OSV
linux-lts-wily vulnerabilities2016-03-14
OSV
linux-lts-vivid vulnerabilities2016-03-14

💥Exploits & PoCs

1
Exploit-DB
Linux Kernel 3.10/3.18 /4.4 - Netfilter IPT_SO_SET_REPLACE Memory Corruption2016-03-09

📋Vendor Advisories

12
Android
CVE-2016-3134: Android Security Bulletin 2016-09-01 CVE: CVE-2016-3134 Severity: CRITICAL References: A-28940694 Upstream kernel2016-09-01
Ubuntu
Linux kernel vulnerabilities2016-08-10
Ubuntu
Linux kernel (OMAP4) vulnerabilities2016-08-10
Ubuntu
Linux kernel (Raspberry Pi 2) vulnerabilities2016-03-16
Ubuntu
Linux kernel (Wily HWE) vulnerabilities2016-03-14

💬Community

2
Bugzilla
CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure2016-03-14
Bugzilla
CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure [fedora-all]2016-03-14