| Vulnerability Name: | CVE-2016-6522 (CCN-125133) | ||||||||||||
| Assigned: | 2016-08-02 | ||||||||||||
| Published: | 2016-08-02 | ||||||||||||
| Updated: | 2017-03-09 | ||||||||||||
| Summary: | Integer overflow in the uvm_map_isavail function in uvm/uvm_map.c in OpenBSD 5.9 allows local users to cause a denial of service (kernel panic) via a crafted mmap call, which triggers the new mapping to overlap with an existing mapping. | ||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-190 | ||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-6522 Source: CCN Type: OpenBSD Web site Missing overflow checks in uvm may result in panics Source: CONFIRM Type: Patch http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/023_uvmisavail.patch.sig Source: CCN Type: oss-sec Mailing List, Tue, 2 Aug 2016 19:48:18 -0400 (EDT) Re: CVE Request: Denial-of-Service / Unexploitable Memory Corruption in mmap() on OpenBSD Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20160802 Re: CVE Request: Denial-of-Service / Unexploitable Memory Corruption in mmap() on OpenBSD Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20160802 CVE Request: Denial-of-Service / Unexploitable Memory Corruption in mmap() on OpenBSD Source: BID Type: UNKNOWN 92264 Source: CCN Type: BID-92264 OpenBSD CVE-2016-6522 Integer Overflow Vulnerability Source: XF Type: UNKNOWN openbsd-cve20166522-dos(125133) | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||