CVE-2015-4004

high

Description

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

References

http://www.ubuntu.com/usn/USN-3004-1

http://www.ubuntu.com/usn/USN-3003-1

http://www.ubuntu.com/usn/USN-3002-1

http://www.ubuntu.com/usn/USN-3001-1

http://www.ubuntu.com/usn/USN-3000-1

http://www.ubuntu.com/usn/USN-2998-1

http://www.ubuntu.com/usn/USN-2989-1

http://www.securityfocus.com/bid/74669

http://openwall.com/lists/oss-security/2015/06/05/7

Details

Source: Mitre, NVD

Published: 2015-06-07

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Severity: High

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High