Threat Report: Exposing Malware in Linux-Based Multi-Cloud Environments | Download Now

Carbon Black Advisory: Response to CVE-2016-5195 (Dirty Cow) Vulnerability

Carbon Black Advisory: Response to CVE-2016-5195 (Dirty Cow) Vulnerability

Version

Cb Response 5.x

Topic

How to fix the CVE-2016-5195 vulnerability on a Cb Response server.

Steps

Cb Response 5.2 supports the latest version of RHEL or CentOS 6.4 to 6.8 (64bit) which has patched the "Dirty Cow" vulnerability CVE-2016-5195. 5.0 supports RHEL or CentOS 6.4­6.6 (64bit). 5.1 supports RHEL or CentOS 6.4­6.7 (64bit). You can review the server sizing guide for more information for what version of Linux your version of Cb Response supports:

Carbon Black Response v5.2 - Server Sizing Guide

Carbon Black Enterprise Response v5.1.1 - Server Sizing Guide

Carbon Black 5.0 - Enterprise Server Sizing Guide.pdf

Important Note(s)

This vulnerability is a privilege escalation that impacts specific kernels, not specific products. The Cb Response product itself does not make it remotely exploitable, while local non privileged user access and a vulnerable kernel does.

Labels (1)
Was this article helpful? Yes No
100% helpful (1/1)
Article Information
Author:
Creation Date:
‎10-27-2016
Views:
397
Contributors