Логотип exploitDog
bind:CVE-2015-4004
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-4004

Количество 5

Количество 5

ubuntu логотип

CVE-2015-4004

больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS2: 8.5
EPSS: Низкий
redhat логотип

CVE-2015-4004

больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2015-4004

больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS2: 8.5
EPSS: Низкий
debian логотип

CVE-2015-4004

больше 10 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untru ...

CVSS2: 8.5
EPSS: Низкий
github логотип

GHSA-wchv-79w6-567f

больше 3 лет назад

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS2: 8.5
4%
Низкий
больше 10 лет назад
redhat логотип
CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS3: 6.7
4%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS2: 8.5
4%
Низкий
больше 10 лет назад
debian логотип
CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untru ...

CVSS2: 8.5
4%
Низкий
больше 10 лет назад
github логотип
GHSA-wchv-79w6-567f

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу