4.9
CVSSv2

CVE-2016-2384

Published: 27/04/2016 Updated: 05/01/2018
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 4.6 | Impact Score: 3.6 | Exploitability Score: 0.9
VMScore: 495
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel prior to 4.5 allows physically proximate malicious users to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

novell suse linux enterprise real time extension 12

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Moderate: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
The system could be made to crash or run programs as an administrator by someone with physical access ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to crash or run programs as an administrator by someone with physical access ...
Several security issues were fixed in the kernel ...
A flaw was found in the USB-MIDI Linux kernel driver: a double-free error could be triggered for the 'umidi' object An attacker with physical access to the system could use this flaw to escalate their privileges ...

Exploits

Source: xairygithubio/blog/2016/cve-2016-2384 Source: githubcom/xairy/kernel-exploits/tree/master/CVE-2016-2384 Source: wwwyoutubecom/watch?v=lfl1NJn1nvo Exploit-DB Note: This requires physical access to the machine, as well as local access on the system - - - This post describes an exploitable vulnerability (CVE-2 ...
Linux kernel version 3x (Ubuntu 1404 / Mint 173 / Fedora 22) double-free usb-midi SMEP local privilege escalation exploit ...

Github Repositories

kernel-exploits CVE-2016-2384: a double-free in USB MIDI driver CVE-2016-9793: a signedness issue with SO_SNDBUFFORCE and SO_RCVBUFFORCE socket options CVE-2017-6074: a double-free in DCCP protocol CVE-2017-7308: a signedness issue in AF_PACKET sockets

References

NVD-CWE-Otherhttp://www.openwall.com/lists/oss-security/2016/02/14/2https://bugzilla.redhat.com/show_bug.cgi?id=1308444http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7https://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlhttp://www.securityfocus.com/bid/83256http://www.debian.org/security/2016/dsa-3503http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.htmlhttp://www.ubuntu.com/usn/USN-2930-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.htmlhttp://www.ubuntu.com/usn/USN-2929-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.htmlhttp://www.ubuntu.com/usn/USN-2932-1http://www.ubuntu.com/usn/USN-2928-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.htmlhttp://www.ubuntu.com/usn/USN-2930-2http://www.ubuntu.com/usn/USN-2929-2http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.htmlhttp://www.ubuntu.com/usn/USN-2931-1http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.htmlhttp://www.ubuntu.com/usn/USN-2930-3http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.htmlhttp://www.ubuntu.com/usn/USN-2928-2http://www.securitytracker.com/id/1035072https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384http://rhn.redhat.com/errata/RHSA-2017-0817.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2584.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2574.htmlhttps://access.redhat.com/errata/RHSA-2016:2574https://nvd.nist.govhttps://www.exploit-db.com/exploits/41999/https://usn.ubuntu.com/2928-1/