Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005.
References
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.html - | |
References | () http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html - | |
References | () http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html - | |
References | () http://seclists.org/fulldisclosure/2015/May/74 - | |
References | () http://seclists.org/fulldisclosure/2015/Oct/50 - | |
References | () http://www.kb.cert.org/vuls/id/177092 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/74724 - | |
References | () http://www.securitytracker.com/id/1032377 - | |
References | () https://www.exploit-db.com/exploits/38454/ - | |
References | () https://www.exploit-db.com/exploits/38566/ - | |
References | () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt - |
Information
Published : 2015-05-21 01:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-3036
Mitre link : CVE-2015-3036
CVE.ORG link : CVE-2015-3036
JSON object : View
Products Affected
kcodes
- netusb
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer