Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-8543

EPSS 1.90% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-8543

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel networking 拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Android和其他产品中使用的Linux kernel 4.3.2及之前版本中的networking实现过程中存在安全漏洞,该漏洞源于程序没有验证协议族的协议标识符。本地攻击者可通过使用CLONE_NEWUSER支持运行特制的SOCK_RAW应用,利用该漏洞拒绝服务(空指针逆向引用和系统崩溃)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-8543

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/bittorrent3389/CVE-2015-8543_for_SLE12SP1POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-8543

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-12-28 · 30 CVEs total

CVE-2015-8647多款Adobe产品释放后重用漏洞
CVE-2015-8660Linux kernel‘fs/overlayfs/inode.c’权限许可和访问控制问题漏洞
CVE-2015-8569Linux kernel 本地信息泄露漏洞
CVE-2015-8374Linux kernel‘btrfs/inode.c’信息泄露漏洞
CVE-2015-7990Linux kernel 竞争条件漏洞
CVE-2015-7885Linux kernel 本地信息泄露漏洞
CVE-2015-7884Linux kernel 本地信息泄露漏洞
CVE-2015-7509Linux kernel 输入验证错误漏洞
CVE-2013-7446Linux kernel 释放后重用漏洞
CVE-2015-6852EMC Secure Remote Services Virtual Edition 目录遍历漏洞
CVE-2015-6850EMC VPLEX GeoSynchrony 权限许可和访问控制漏洞
CVE-2015-8651多款Adobe产品数字错误漏洞
CVE-2015-8650多款Adobe产品释放后重用漏洞
CVE-2015-8649多款Adobe产品释放后重用漏洞
CVE-2015-8648多款Adobe产品释放后重用漏洞
CVE-2015-8459多款Adobe产品缓冲区溢出漏洞
CVE-2015-8646多款Adobe产品释放后重用漏洞
CVE-2015-8645多款Adobe产品缓冲区溢出漏洞
CVE-2015-8644多款Adobe产品安全漏洞
CVE-2015-8643多款Adobe产品释放后重用漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-8543

No comments yet


Leave a comment