CVE-2016-5342 
                        Detail
                     
                    
                    
                        
                            
                                
                                    Deferred This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
                                 
                             
                            Description  
                            
                            Heap-based buffer overflow in the wcnss_wlan_write function in drivers/net/wireless/wcnss/wcnss_wlan.c in the wcnss_wlan device driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact by writing to /dev/wcnss_wlan with an unexpected amount of data.
                            
                            
                            
                            
                                Metrics 
                                 
                                
                                    CVSS Version 4.0
                                     
                                    CVSS Version 3.x
                                     
                                    CVSS Version 2.0
                                     
                                
                                
                                    
                                        
                                            NVD enrichment efforts reference publicly available information to associate
                                            vector strings. CVSS information contributed by other sources is also
                                            displayed.
                                         
                                     
                                
                                
                                
                                    CVSS 4.0 Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
                                       
                                             NVD assessment
                                       not yet provided.   
                                     
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 3.x Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
												Vector:  
													CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 2.0 Severity and Vector Strings:   
                                    
                                    
                                        
                                        
                                        
												Vector:  
													(AV:L/AC:L/Au:N/C:C/I:C/A:C) 
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                             
                            
                                
                                
                                
                                
                                    References to Advisories, Solutions, and Tools 
                                    
                                        By selecting these links, you will be leaving NIST webspace.
                                        We have provided these links to other web sites because they
                                        may have information that would be of interest to you. No
                                        inferences should be drawn on account of other sites being
                                        referenced, or not, from this page. There may be other web
                                        sites that are more appropriate for your purpose. NIST does
                                        not necessarily endorse the views expressed, or concur with
                                        the facts presented on these sites. Further, NIST does not
                                        endorse any commercial products that may be mentioned on
                                        these sites. Please address comments about this page to [email protected] 
                                    
                                 
                                
                                
                                    Weakness Enumeration 
                                    
                                        
                                        
                                            CWE-ID 
                                            CWE Name 
                                            Source 
                                         
                                         
                                        
                                        
                                            
                                                CWE-787 
                                                
                                             
                                            Out-of-bounds Write 
                                            
														
														NIST   
														 
                                             
                                         
                                         
                                    
                                 
                                
                                
                                    Change History 
                                     10 change records found show changes 
                                     
                                    
	
		
			 
			
				CVE Modified by CVE  11/20/2024 9:54:08 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://source.android.com/security/bulletin/2016-10-01.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/bid/92693 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.codeaurora.org/buffer-overflow-vulnerability-wcnsswlanwrite-cve-2016-5342 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by MITRE  5/14/2024 12:01:27 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  8/04/2020 3:13:38 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3.1 
						
							
							
								
								
							
							
						 
							
						
							
								NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 
								  
					 
					
						Removed 
						CVSS V3 
						
							
							
							
								NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 
								  
							
						
								
								
						 
					 
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								NIST CWE-787 
								  
					 
					
						Removed 
						CWE 
						
							
							
							
								NIST CWE-119 
								  
							
						
								
								
						 
					 
					
						Removed 
						CPE Configuration 
						
							
							
							
								
								Record truncated, showing 2048 of 41228 characters.  View Entire Change Record OR
     *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.30:*:* 
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://source.android.com/security/bulletin/2016-10-01.html Third Party Advisory 
								  
							
						
							
								http://source.android.com/security/bulletin/2016-10-01.html Patch, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.securityfocus.com/bid/92693 No Types Assigned 
								  
							
						
							
								http://www.securityfocus.com/bid/92693 Third Party Advisory, VDB Entry 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9 Issue Tracking, Patch 
								  
							
						
							
								https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9 Mailing List, Patch, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.codeaurora.org/buffer-overflow-vulnerability-wcnsswlanwrite-cve-2016-5342 Patch, Third Party Advisory 
								  
							
						
							
								https://www.codeaurora.org/buffer-overflow-vulnerability-wcnsswlanwrite-cve-2016-5342 Broken Link 
								  
					 
					
						Removed 
						CVSS V2 Metadata 
						
							
							
							
								Access Complexity Insufficient Information 
								  
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by MITRE  11/28/2016 3:24:38 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.securityfocus.com/bid/92693 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  10/13/2016 4:37:37 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						CPE Configuration 
						
							
							
							
								
								Record truncated, showing 2048 of 44914 characters.  View Entire Change Record Configuration 1
     OR
          *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:arm6 
								
								
							
							
						 
							
						
							
								
								Record truncated, showing 2048 of 45007 characters.  View Entire Change Record Configuration 1
     OR
          *cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* (and previous)
Configuration 2
     OR
          *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux: 
								
								
						 
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://source.android.com/security/bulletin/2016-10-01.html No Types Assigned 
								  
							
						
							
								http://source.android.com/security/bulletin/2016-10-01.html Third Party Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				Initial CVE Analysis  10/12/2016 4:24:53 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						CPE Configuration 
						
							
							
							
								
								Record truncated, showing 2048 of 44914 characters.  View Entire Change Record Configuration 1
     OR
          *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:arm6 
								
								
							
							
						 
							
						
							
								
								Record truncated, showing 2048 of 45007 characters.  View Entire Change Record Configuration 1
     OR
          *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:arm6 
								
								
						 
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://source.android.com/security/bulletin/2016-10-01.html No Types Assigned 
								  
							
						
							
								http://source.android.com/security/bulletin/2016-10-01.html Third Party Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by MITRE  10/11/2016 10:02:57 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://source.android.com/security/bulletin/2016-10-01.html 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  9/06/2016 1:57:27 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						CVSS V3 
						
							
							
							
								AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 
								  
							
						
							
								AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 
								  
					 
					
						Changed 
						CVSS V2 
						
							
							
							
								(AV:N/AC:L/Au:N/C:C/I:C/A:C) 
								  
							
						
							
								(AV:L/AC:L/Au:N/C:C/I:C/A:C) 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  8/31/2016 12:15:57 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3 
						
							
							
								
								
							
							
						 
							
						
							
								AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 
								  
					 
					
						Added 
						CVSS V2 
						
							
							
								
								
							
							
						 
							
						
							
								(AV:N/AC:L/Au:N/C:C/I:C/A:C) 
								  
					 
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								CWE-119 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								
								Record truncated, showing 2048 of 44914 characters.  View Entire Change Record Configuration 1
     OR
          *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:arm64:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:arm6 
								
								
						 
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9 No Types Assigned 
								  
							
						
							
								https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9 Issue Tracking, Patch 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.codeaurora.org/buffer-overflow-vulnerability-wcnsswlanwrite-cve-2016-5342 No Types Assigned 
								  
							
						
							
								https://www.codeaurora.org/buffer-overflow-vulnerability-wcnsswlanwrite-cve-2016-5342 Third Party Advisory, Patch 
								  
					 
				 
			
		 
	
		
			 
			
				Initial CVE Analysis  8/30/2016 3:25:00 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		  
	 
                                 
                             
                         
                        
                            
                                Quick Info 
                                CVE Dictionary Entry:  CVE-2016-5342  NVD
                                Published Date:  08/30/2016  NVD
                                Last Modified:  04/12/2025  
                                Source:  MITRE