First published: Mon Jun 13 2016(Updated: )
libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
SUSE Libndp | <=1.5 | |
Debian Linux | =8.0 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3698 is classified as important due to its potential to allow man-in-the-middle attacks and network connectivity disruption.
To mitigate CVE-2016-3698, update libndp to version 1.6 or later which correctly validates Neighbor Discovery Protocol messages.
CVE-2016-3698 affects libndp versions up to 1.5 and multiple Red Hat Enterprise Linux and Ubuntu versions.
CVE-2016-3698 can lead to man-in-the-middle attacks and denial of service by improperly handled Neighbor Discovery Protocol messages.
Users of affected systems, particularly those using outdated versions of libndp on Red Hat or Ubuntu distributions, are at risk for CVE-2016-3698.