CVE-2016-9604 - Improper Verification of Cryptographic Signature

Severity

21%

Complexity

39%

Confidentiality

48%

It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.

It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.

CVSS 3.0 Base Score 4.4. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).

CVSS 2.0 Base Score 2.1. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:P/A:N).

Demo Examples

Improper Verification of Cryptographic Signature

CWE-347

In the following code, a JarFile object is created from a downloaded file.


               
JarFile jf = new JarFile(f);

The JAR file that was potentially downloaded from an untrusted source is created without verifying the signature (if present). An alternate constructor that accepts a boolean verify parameter should be used instead.

Overview

First reported 6 years ago

2018-07-11 13:29:00

Last updated 5 years ago

2019-10-09 23:20:00

Affected Software

Linux Kernel

Linux Linux Kernel 4.11 Release Candidate 1

4.11

Linux Linux Kernel 4.11 Release Candidate 2

4.11

Linux Linux Kernel 4.11 Release Candidate 3

4.11

Linux Linux Kernel 4.11 Release Candidate 4

4.11

Linux Linux Kernel 4.11 Release Candidate 5

4.11

Linux Linux Kernel 4.11 Release Candidate 6

4.11

Linux Linux Kernel 4.11 Release Candidate 7

4.11

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.