CVE-2016-7796

The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0003.html
http://www.openwall.com/lists/oss-security/2016/09/30/1 Third Party Advisory
http://www.securityfocus.com/bid/93250 Third Party Advisory
http://www.securitytracker.com/id/1037320
https://bugzilla.redhat.com/show_bug.cgi?id=1381911 Issue Tracking Third Party Advisory VDB Entry
https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 Exploit Patch Vendor Advisory
https://rhn.redhat.com/errata/RHBA-2015-2092.html Third Party Advisory
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet Exploit Technical Description Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0003.html
http://www.openwall.com/lists/oss-security/2016/09/30/1 Third Party Advisory
http://www.securityfocus.com/bid/93250 Third Party Advisory
http://www.securitytracker.com/id/1037320
https://bugzilla.redhat.com/show_bug.cgi?id=1381911 Issue Tracking Third Party Advisory VDB Entry
https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 Exploit Patch Vendor Advisory
https://rhn.redhat.com/errata/RHBA-2015-2092.html Third Party Advisory
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:systemd_project:systemd:209:*:*:*:*:*:*:*
cpe:2.3:a:systemd_project:systemd:213:*:*:*:*:*:*:*
cpe:2.3:a:systemd_project:systemd:214:*:*:*:*:*:*:*
cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:ltss:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server_for_sap:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2017-0003.html - () http://rhn.redhat.com/errata/RHSA-2017-0003.html -
References () http://www.openwall.com/lists/oss-security/2016/09/30/1 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/30/1 - Third Party Advisory
References () http://www.securityfocus.com/bid/93250 - Third Party Advisory () http://www.securityfocus.com/bid/93250 - Third Party Advisory
References () http://www.securitytracker.com/id/1037320 - () http://www.securitytracker.com/id/1037320 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1381911 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1381911 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 - Exploit, Patch, Vendor Advisory () https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 - Exploit, Patch, Vendor Advisory
References () https://rhn.redhat.com/errata/RHBA-2015-2092.html - Third Party Advisory () https://rhn.redhat.com/errata/RHBA-2015-2092.html - Third Party Advisory
References () https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet - Exploit, Technical Description, Third Party Advisory () https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet - Exploit, Technical Description, Third Party Advisory

12 Sep 2023, 14:45

Type Values Removed Values Added
CPE cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:* cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*

Information

Published : 2016-10-13 14:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7796

Mitre link : CVE-2016-7796

CVE.ORG link : CVE-2016-7796


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_software_development_kit
  • suse_linux_enterprise_server_for_sap
  • suse_linux_enterprise_server
  • suse_linux_enterprise_desktop

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation

systemd_project

  • systemd
CWE
CWE-20

Improper Input Validation