Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-4004

Опубликовано: 07 июн. 2015
Источник: nvd
CVSS2: 8.5
EPSS Низкий

Описание

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 3.4 (включая) до 4.3 (исключая)

EPSS

Процентиль: 89%
0.04322
Низкий

8.5 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS3: 6.7
redhat
больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

debian
больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untru ...

github
больше 3 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

EPSS

Процентиль: 89%
0.04322
Низкий

8.5 High

CVSS2

Дефекты

CWE-119