CVE-2016-2782
Medium
Low
Medium
High
Critical
4.6
CVSS Score
Vulnerability Description
The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
P
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H
Known Affected Software
11 configuration(s) from 2 vendor(s)
linux_kernel
Version:
4.5.0
CPE:
cpe:2.3:o:linux:linux_kernel:4.5.0:rc1:*:*:*:*:*:*
linux_enterprise_debuginfo
Version:
11
CPE:
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:*
linux_enterprise_real_time_extension
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
linux_enterprise_module_for_public_cloud
Version:
12
CPE:
cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
linux_enterprise_server
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*
linux_enterprise_real_time_extension
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
linux_enterprise_server
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:*
linux_enterprise_desktop
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:*
linux_enterprise_workstation_extension
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
linux_enterprise_software_development_kit
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:-:*:*:*:*:*:*
linux_enterprise_software_development_kit
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
This vulnerability affects 11 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0secalert@redhat.com Issue Tracking Patch Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.htmlsecalert@redhat.com Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/02/28/9secalert@redhat.com Mailing List Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2929-1secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2929-2secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2930-1secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2930-2secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2930-3secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2932-1secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2948-1secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2948-2secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2967-1secalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2967-2secalert@redhat.com Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1312670secalert@redhat.com Exploit Issue Tracking Third Party Advisory
-
https://github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0secalert@redhat.com Issue Tracking Patch Third Party Advisory
-
https://www.exploit-db.com/exploits/39539/secalert@redhat.com Third Party Advisory VDB Entry
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/02/28/9af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2929-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2929-2af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2930-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2930-2af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2930-3af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2932-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2948-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2948-2af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2967-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2967-2af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1312670af854a3a-2127-422b-91ae-364da2661108 Exploit Issue Tracking Third Party Advisory
-
https://github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch Third Party Advisory
-
https://www.exploit-db.com/exploits/39539/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
Severity Details
4.6
out of 10.0
Medium
Weakness Type (CWE)
CWE-476
Top 25 #21
NULL Pointer Dereference
- Description
- The product dereferences a pointer that it expects to be valid but is NULL.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- April 27, 2016
