The default configuration of udev on Linux does not warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer.
References
Link | Resource |
---|---|
http://news.cnet.com/8301-27080_3-20028919-245.html | Broken Link |
http://www.blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#Stavrou | Not Applicable |
http://www.cs.gmu.edu/~astavrou/publications.html | Broken Link |
http://news.cnet.com/8301-27080_3-20028919-245.html | Broken Link |
http://www.blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#Stavrou | Not Applicable |
http://www.cs.gmu.edu/~astavrou/publications.html | Broken Link |
Configurations
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://news.cnet.com/8301-27080_3-20028919-245.html - Broken Link | |
References | () http://www.blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#Stavrou - Not Applicable | |
References | () http://www.cs.gmu.edu/~astavrou/publications.html - Broken Link |
Information
Published : 2011-01-25 01:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0640
Mitre link : CVE-2011-0640
CVE.ORG link : CVE-2011-0640
JSON object : View
Products Affected
udev_project
- udev
CWE