Vulnerability & Exploit Database

Displaying all 9 entries

Results for: CVE-2016-3695 Back to search

Huawei EulerOS: CVE-2016-3695: kernel security update Vulnerability

  • Severity: 2
  • Published: December 29, 2017

The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.

Oracle Solaris 11: CVE-2016-1245: Vulnerability in Quagga Vulnerability

  • Severity: 8
  • Published: February 22, 2017

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

Gentoo Linux: CVE-2016-1245: Quagga: Multiple vulnerabilities Vulnerability

  • Severity: 8
  • Published: February 22, 2017

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

Alpine Linux: CVE-2016-1245: quagga Buffer Overflow in IPv6 RA handling Vulnerability

  • Severity: 8
  • Published: February 22, 2017

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

Ubuntu: USN-3110-1 (CVE-2016-1245): Quagga vulnerability Vulnerability

  • Severity: 8
  • Published: October 18, 2016

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

SUSE: CVE-2016-1245: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 18, 2016

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

Oracle Linux: (CVE-2016-1245) ELSA-2017-0794: quagga security and bug fix update Vulnerability

  • Severity: 8
  • Published: October 18, 2016

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

Debian: CVE-2016-1245: quagga -- security update Vulnerability

  • Severity: 8
  • Published: October 18, 2016

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.