CVE-2016-3695

Published: Dic 29, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2016-4717 Aliases: GSD-2016-3695
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,5
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
LOW 2,1
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0006
Percentile
0,2th
Updated

EPSS Score Trend (Last 90 Days)

74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Access Control Other Integrity Non-Repudiation
Potential Impacts:
Read Application Data Bypass Protection Mechanism Alter Execution Logic Other Hide Activities
Applicable Platforms
All platforms may be affected
View CWE Details
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
http://www.securityfocus.com/bid/102327
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102327
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
http://www.securityfocus.com/bid/102327
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102327