CVE-2016-5195

Scores

EPSS

0.942high94.2%
0%20%40%60%80%100%

Percentile: 94.2%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Description

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka “Dirty COW.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-362

Related Vulnerabilities

Exploits

Exploit ID: CVE-2016-5195

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 40611

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40611

Exploit ID: 40616

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40616

Exploit ID: 40838

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40838

Exploit ID: 40839

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40839

Exploit ID: 40847

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40847

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2133.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2132.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2128.html

Source: nvd

For details on how to apply this update, which includes the changes described inthis advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2127.html

Source: nvd

For details on how to apply this update, which includes the changes described inthis advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2126.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2120.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2118.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2106.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2105.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

URL: http://rhn.redhat.com/errata/RHSA-2016-2098.html

Vulnerable Software (76)

Type: Configuration

Product: kernel

Operating System: rhel 5

Trait:
{  "fixed": "2.6.18-416.el5"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 5.6

Trait:
{  "fixed": "2.6.18-238.57.1.el5"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 5.9

Trait:
{  "fixed": "2.6.18-348.32.1.el5"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6

Trait:
{  "fixed": "2.6.32-642.6.2.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6.2

Trait:
{  "fixed": "2.6.32-220.68.1.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6.4

Trait:
{  "fixed": "2.6.32-358.75.1.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6.5

Trait:
{  "fixed": "2.6.32-431.75.1.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6.5

Trait:
{  "fixed": "2.6.32-431.75.1.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6.6

Trait:
{  "fixed": "2.6.32-504.54.1.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 6.7

Trait:
{  "fixed": "2.6.32-573.35.2.el6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 7

Trait:
{  "fixed": "3.10.0-327.36.3.el7"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 7.1

Trait:
{  "fixed": "3.10.0-229.42.2.el7"}

Source: redhat

Type: Configuration

Product: kernel-aarch64

Operating System: rhel 7

Trait:
{  "fixed": "4.5.0-15.2.1.el7"}

Source: redhat

Type: Configuration

Product: kernel-headers-modules-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat

Type: Configuration

Product: kernel-headers-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat

Type: Configuration

Product: kernel-image-domU-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat

Type: Configuration

Product: kernel-image-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat

Type: Configuration

Product: kernel-modules-alsa-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat

Type: Configuration

Product: kernel-modules-drm-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat

Type: Configuration

Product: kernel-modules-ide-ovz-el

Operating System: altlinux

Trait:
{  "fixed": "0:2.6.32-alt144"}

Source: redhat