net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
{ "vanir_signatures": [ { "digest": { "length": 479.0, "function_hash": "317424369091742007402530138941656856519" }, "signature_type": "Function", "deprecated": false, "source": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758", "id": "CVE-2016-5696-2952fc9b", "target": { "function": "tcp_send_challenge_ack", "file": "net/ipv4/tcp_input.c" }, "signature_version": "v1" }, { "digest": { "length": 479.0, "function_hash": "317424369091742007402530138941656856519" }, "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75ff39ccc1bd5d3c455b6822ab09e533c551f758", "id": "CVE-2016-5696-3079b827", "target": { "function": "tcp_send_challenge_ack", "file": "net/ipv4/tcp_input.c" }, "signature_version": "v1" }, { "digest": { "threshold": 0.9, "line_hashes": [ "337350145804779339330594945509006368024", "239125848350168077293675951068588329693", "155800975917078570903974579556486526694", "214077486385140182600903825827271961016", "299725323958299412875357565839455187375", "105979103483326321441603223828175463793", "261565725033869532375054669583338089927", "105613207827221158594970792067072456143", "129575374934853602782248044972495836418", "332543767270114264396376132802890145974", "164052961824676823733982451124962484362", "115015315111503299398347337553858582016", "237419743845812927883483344238137098208", "109227497217799153108656921983898490592", "34943939768429199658478459830712634089", "68065258545218086070659223335560626219", "208526435651038356539307190846209248681" ] }, "signature_type": "Line", "deprecated": false, "source": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758", "id": "CVE-2016-5696-55ff2c19", "target": { "file": "net/ipv4/tcp_input.c" }, "signature_version": "v1" }, { "digest": { "threshold": 0.9, "line_hashes": [ "337350145804779339330594945509006368024", "239125848350168077293675951068588329693", "155800975917078570903974579556486526694", "214077486385140182600903825827271961016", "299725323958299412875357565839455187375", "105979103483326321441603223828175463793", "261565725033869532375054669583338089927", "105613207827221158594970792067072456143", "129575374934853602782248044972495836418", "332543767270114264396376132802890145974", "164052961824676823733982451124962484362", "115015315111503299398347337553858582016", "237419743845812927883483344238137098208", "109227497217799153108656921983898490592", "34943939768429199658478459830712634089", "68065258545218086070659223335560626219", "208526435651038356539307190846209248681" ] }, "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75ff39ccc1bd5d3c455b6822ab09e533c551f758", "id": "CVE-2016-5696-9c1cb08f", "target": { "file": "net/ipv4/tcp_input.c" }, "signature_version": "v1" } ] }