cve/2015/CVE-2015-4004.md

22 lines
906 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-4004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4004)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1
- https://lkml.org/lkml/2015/5/13/739
#### Github
- https://github.com/Live-Hack-CVE/CVE-2015-4004