{"id":"CVE-2016-3707","details":"The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.","modified":"2026-03-15T22:22:05.256924Z","published":"2016-06-27T10:59:04.563Z","related":["SUSE-SU-2016:1764-1","SUSE-SU-2016:1937-1","SUSE-SU-2016:1985-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/05/17/1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1301"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1341"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327484"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3707.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7"}]},{"events":[{"introduced":"0"},{"last_affected":"7"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}