CVE-2016-5696

MEDIUM

Linux kernel <4.7 - RCE

Title source: llm
STIX 2.1

Description

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

Exploits (5)

nomisec WORKING POC 102 stars
by violentshell · poc
https://github.com/violentshell/rover
nomisec WORKING POC 75 stars
by jduck · poc
https://github.com/jduck/challack
nomisec WORKING POC 40 stars
by Gnoxter · poc
https://github.com/Gnoxter/mountain_goat
nomisec WORKING POC 2 stars
by bplinux · poc
https://github.com/bplinux/chackd
nomisec SCANNER 1 stars
by unkaktus · poc
https://github.com/unkaktus/grill

References (32)

Core 32
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1657.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1814.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/91704
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1815.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1939.html
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3071-1
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1632.html
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3070-4
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1036625
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1631.html
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1354708
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3072-2
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1633.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-1664.html
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3072-1
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/07/12/2
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3071-2
Various Sources x_refsource_confirm
https://security.paloaltonetworks.com/CVE-2016-5696
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Gnoxter/mountain_goat
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3070-1
Various Sources x_refsource_confirm
https://bto.bluecoat.com/security-advisory/sa131
Third Party Advisory x_refsource_confirm
http://source.android.com/security/bulletin/2016-10-01.html
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3070-3
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3070-2

Scores

CVSS v3 4.8
EPSS 0.5199
EPSS Percentile 97.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

Details

CWE
CWE-200
Status published
Products (4)
google/android < 7.0
linux/linux_kernel < 4.6.6
oracle/vm_server 3.3
oracle/vm_server 3.4
Published Aug 06, 2016
Tracked Since Feb 18, 2026