Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
References
Link | Resource |
---|---|
http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf | Exploit Technical Description Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=722393 | Issue Tracking Patch Third Party Advisory |
http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf | Exploit Technical Description Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=722393 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf - Exploit, Technical Description, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=722393 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2020-02-11 19:15
Updated : 2024-11-21 01:08
NVD link : CVE-2009-4067
Mitre link : CVE-2009-4067
CVE.ORG link : CVE-2009-4067
JSON object : View
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')