9.8
CVSSv3

CVE-2016-10229

Published: 04/04/2017 Updated: 20/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

udp.c in the Linux kernel prior to 4.5 allows remote malicious users to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

google android

Vendor Advisories

Unsafe second checksum calculation in udpc:The Linux kernel allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag This may create a kernel panic or memory corruption leading to privilege escalation (CVE-2016-10229) ...
A security has been in found in udpc in the Linux kernel before 45, which allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during the execution of a recv() system call with the MSG_PEEK flag set ...
The Linux kernel allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag This may create a kernel panic or memory corruption leading to privilege escalation ...
Multiple Fortinet products may be affected by the following Linux Kernel vulnerability: CVE-2016-10229 Linux Kernel ipv4/udpc Remote Code Execution Vulnerability udpc in the Linux kernel before 45 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv sys ...
<!-- Start - Changes for Security Advisory Channel --> Security Advisory ID SYMSA1404 Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score: Legacy ID 9 May 2017 Open High CVSS v2: 100 SA148 ...
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices Alongside the bulletin, we have released a security update to Nexus devices through an over-the-air (OTA) update The Google device firmware images have also been released to the Google Developer site Security patch levels of April 05, 2017 or lat ...
Oracle Linux Bulletin - April 2017 Description The Oracle Linux Bulletin lists all CVEs that had been resolved and announced in Oracle Linux Security Advisories (ELSA) in the last one month prior to the release of the bulletin Oracle Linux Bulletins are published on the same day as Oracle Critical Patch Updates are release ...
Oracle VM Server for x86 Bulletin - April 2017 Description The Oracle VM Server for x86 Bulletin lists all CVEs that had been resolved and announced in Oracle VM Server for x86 Security Advisories (OVMSA) in the last one month prior to the release of the bulletin Oracle VM Server for x86 Bulletins are published on the same day ...

Github Repositories

CVE-Study CVE id CVSS Type CVE-2017-12762 100 BOF CVE-2017-0561 100 - CVE-2017-11176 100 UAF CVE-2017-8890 100 CVE-2017-7895 100 CVE-2017-3106 93 CVE-2017-3064 93 CVE-2017-0430 93 CVE-2017-0429 93 CVE-2017-0428 93 CVE-2017-0427 93 CVE-2017-0528 93 CVE-2017-0510 93 CVE-2017-0508 93 CVE-2017-0507 93 CVE-2017-0455 93

Recent Articles

Linux remote root bug menace: Make sure your servers, PCs, gizmos, Android kit are patched
The Register • Iain Thomson in San Francisco • 14 Apr 2017

Ping of pwn: Malicious UDP packets may take over gear

A Linux kernel flaw that potentially allows miscreants to remotely control vulnerable servers, desktops, IoT gear, Android handhelds, and more, has been quietly patched.
The programming blunder – CVE-2016-10229 – exposes machines and gizmos to attacks via UDP network traffic: any software receiving data using the system call recv() with the MSG_PEEK flag set on a vulnerable kernel opens up the box to potential hijacking. The hacker would have to craft packets to trigger a second checks...

Linux remote root bug menace: Make sure your servers, PCs, gizmos, Android kit are patched
The Register • Iain Thomson in San Francisco • 14 Apr 2017

Ping of pwn: Malicious UDP packets may take over gear

A Linux kernel flaw that potentially allows miscreants to remotely control vulnerable servers, desktops, IoT gear, Android handhelds, and more, has been quietly patched.
The programming blunder – CVE-2016-10229 – exposes machines and gizmos to attacks via UDP network traffic: any software receiving data using the system call recv() with the MSG_PEEK flag set on a vulnerable kernel opens up the box to potential hijacking. The hacker would have to craft packets to trigger a second checks...