DNA View

CVE-2016-7796

Low
Low Medium High Critical
CVSS Score
Published: Oct 13, 2016
Last Modified: Apr 12, 2025

Vulnerability Description

The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.

Known Affected Software

12 configuration(s) from 3 vendor(s)

suse_linux_enterprise_server_for_sap
Version:
12.0
CPE:
cpe:2.3:o:novell:suse_linux_enterprise_server_for_sap:12.0:*:*:*:*:*:*:*
suse_linux_enterprise_server
Version:
12.0
CPE:
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:-:*:*:*:*:*:*
suse_linux_enterprise_desktop
Version:
12
CPE:
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*
suse_linux_enterprise_software_development_kit
Version:
12.0
CPE:
cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:-:*:*:*:*:*:*
enterprise_linux_workstation
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*
enterprise_linux_hpc_node
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
enterprise_linux_server
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:x64:*
enterprise_linux_desktop
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*
systemd
Version:
213
CPE:
cpe:2.3:a:systemd_project:systemd:213:*:*:*:*:*:*:*
systemd
Version:
229
CPE:
cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:*
systemd
Version:
209
CPE:
cpe:2.3:a:systemd_project:systemd:209:*:*:*:*:*:*:*
systemd
Version:
214
CPE:
cpe:2.3:a:systemd_project:systemd:214:*:*:*:*:*:*:*
This vulnerability affects 12 software configuration(s). Ensure you patch all affected systems.

References & Resources

Severity Details

out of 10.0
Low

Weakness Type (CWE)

CWE-20 Top 25 #14

Improper Input Validation

Description
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploit Likelihood
High
Typical Severity
High
Abstraction Level
Class

Key Information

Published Date
October 13, 2016