net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75ff39ccc1bd5d3c455b6822ab09e533c551f758",
"id": "CVE-2016-5696-3079b827",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "tcp_send_challenge_ack",
"file": "net/ipv4/tcp_input.c"
},
"digest": {
"length": 479.0,
"function_hash": "317424369091742007402530138941656856519"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75ff39ccc1bd5d3c455b6822ab09e533c551f758",
"id": "CVE-2016-5696-9c1cb08f",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_input.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"337350145804779339330594945509006368024",
"239125848350168077293675951068588329693",
"155800975917078570903974579556486526694",
"214077486385140182600903825827271961016",
"299725323958299412875357565839455187375",
"105979103483326321441603223828175463793",
"261565725033869532375054669583338089927",
"105613207827221158594970792067072456143",
"129575374934853602782248044972495836418",
"332543767270114264396376132802890145974",
"164052961824676823733982451124962484362",
"115015315111503299398347337553858582016",
"237419743845812927883483344238137098208",
"109227497217799153108656921983898490592",
"34943939768429199658478459830712634089",
"68065258545218086070659223335560626219",
"208526435651038356539307190846209248681"
]
},
"signature_type": "Line"
}
]
[
{
"source": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758",
"id": "CVE-2016-5696-2952fc9b",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "tcp_send_challenge_ack",
"file": "net/ipv4/tcp_input.c"
},
"digest": {
"length": 479.0,
"function_hash": "317424369091742007402530138941656856519"
},
"signature_type": "Function"
},
{
"source": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758",
"id": "CVE-2016-5696-55ff2c19",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_input.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"337350145804779339330594945509006368024",
"239125848350168077293675951068588329693",
"155800975917078570903974579556486526694",
"214077486385140182600903825827271961016",
"299725323958299412875357565839455187375",
"105979103483326321441603223828175463793",
"261565725033869532375054669583338089927",
"105613207827221158594970792067072456143",
"129575374934853602782248044972495836418",
"332543767270114264396376132802890145974",
"164052961824676823733982451124962484362",
"115015315111503299398347337553858582016",
"237419743845812927883483344238137098208",
"109227497217799153108656921983898490592",
"34943939768429199658478459830712634089",
"68065258545218086070659223335560626219",
"208526435651038356539307190846209248681"
]
},
"signature_type": "Line"
}
]