CVE-2016-3707
moderate-risk
Published 2016-06-27
The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
Do I need to act?
~
1.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (4)
References (14)
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1301
Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1341
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1327484
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1301
Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1341
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1327484
39
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
5/34 · Minimal
Exposure
10/34 · Low