Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=722393 | Issue Tracking Patch Third Party Advisory |
http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf | Exploit Technical Description Third Party Advisory |
Information
Published : 2020-02-11 11:15
Updated : 2020-02-12 13:42
NVD link : CVE-2009-4067
Mitre link : CVE-2009-4067
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel