net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.3"
},
{
"introduced": "0"
},
{
"last_affected": "3.4"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.6.6"
}
]
}
]
[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2016-5696-3079b827",
"target": {
"file": "net/ipv4/tcp_input.c",
"function": "tcp_send_challenge_ack"
},
"digest": {
"length": 479.0,
"function_hash": "317424369091742007402530138941656856519"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75ff39ccc1bd5d3c455b6822ab09e533c551f758"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2016-5696-9c1cb08f",
"target": {
"file": "net/ipv4/tcp_input.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"337350145804779339330594945509006368024",
"239125848350168077293675951068588329693",
"155800975917078570903974579556486526694",
"214077486385140182600903825827271961016",
"299725323958299412875357565839455187375",
"105979103483326321441603223828175463793",
"261565725033869532375054669583338089927",
"105613207827221158594970792067072456143",
"129575374934853602782248044972495836418",
"332543767270114264396376132802890145974",
"164052961824676823733982451124962484362",
"115015315111503299398347337553858582016",
"237419743845812927883483344238137098208",
"109227497217799153108656921983898490592",
"34943939768429199658478459830712634089",
"68065258545218086070659223335560626219",
"208526435651038356539307190846209248681"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75ff39ccc1bd5d3c455b6822ab09e533c551f758"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5696.json"