The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T00:03:34.462Z
Reserved: 2016-03-30T00:00:00
Link: CVE-2016-3707

No data.

Status : Modified
Published: 2016-06-27T10:59:04.563
Modified: 2024-11-21T02:50:32.623
Link: CVE-2016-3707
