Severity
8.1HIGH
EPSS
1.8%
top 17.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 27
Latest updateMay 17

Description

The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

Debianlinux< 3.15~rc5-1~exp1+3

Also affects: Enterprise Linux 7

🔴Vulnerability Details

3
GHSA
GHSA-558g-x28c-wmj6: The icmp_check_sysrq function in net/ipv4/icmp2022-05-17
CVEList
CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp2016-06-27
OSV
CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp2016-06-27

📋Vendor Advisories

2
Red Hat
kernel-rt: Sending SysRq command via ICMP echo request2016-05-17
Debian
CVE-2016-3707: linux - The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt p...2016

💬Community

1
Bugzilla
CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request2016-04-15
CVE-2016-3707 (HIGH CVSS 8.1) | The icmp_check_sysrq function in ne | cvebase.io