The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.

Project Subscriptions

Vendors Products
Linux Kernel-rt Subscribe
Suse Linux Enterprise Real Time Extension Subscribe
Enterprise Linux For Real Time Subscribe
Enterprise Linux For Real Time For Nfv Subscribe
Enterprise Mrg Subscribe
Rhel Extras Rt Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2016-4728 The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T00:03:34.462Z

Reserved: 2016-03-30T00:00:00

Link: CVE-2016-3707

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-06-27T10:59:04.563

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-3707

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-05-17T00:00:00Z

Links: CVE-2016-3707 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses