CVE-2014-3185
Kernel: USB serial: memory corruption flaw
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
Múltiples desbordamientos de buffer en la función command_port_read_callback en drivers/usb/serial/whiteheat.c en Whiteheat USB Serial Driver en el kernel de Linux anterior a 3.16.2 permiten a atacantes físicamente próximos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria y caída del sistema) a través de un dispositivo manipulado que proporciona una cantidad grande de datos (1) EHCI o (2) XHCI asociados con una respuesta en masa.
A memory corruption flaw was found in the way the USB ConnectTech WhiteHEAT serial driver processed completion commands sent via USB Request Blocks buffers. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-05-03 CVE Reserved
- 2014-09-28 CVE Published
- 2024-08-06 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (20)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6817ae225cd650fb1c3295d769298c38b1eba818 | Broken Link | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2014/09/11/21 | Mailing List | |
http://www.securityfocus.com/bid/69781 | Third Party Advisory | |
https://code.google.com/p/google-security-research/issues/detail?id=98 | Third Party Advisory | |
https://github.com/torvalds/linux/commit/6817ae225cd650fb1c3295d769298c38b1eba818 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html | 2024-03-14 | |
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html | 2024-03-14 | |
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html | 2024-03-14 | |
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html | 2024-03-14 | |
http://rhn.redhat.com/errata/RHSA-2014-1318.html | 2024-03-14 | |
http://rhn.redhat.com/errata/RHSA-2015-0284.html | 2024-03-14 | |
http://www.ubuntu.com/usn/USN-2374-1 | 2024-03-14 | |
http://www.ubuntu.com/usn/USN-2375-1 | 2024-03-14 | |
http://www.ubuntu.com/usn/USN-2376-1 | 2024-03-14 | |
http://www.ubuntu.com/usn/USN-2377-1 | 2024-03-14 | |
http://www.ubuntu.com/usn/USN-2378-1 | 2024-03-14 | |
http://www.ubuntu.com/usn/USN-2379-1 | 2024-03-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1141400 | 2015-03-03 | |
https://access.redhat.com/security/cve/CVE-2014-3185 | 2015-03-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.2.63 Search vendor "Linux" for product "Linux Kernel" and version " < 3.2.63" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.3 < 3.4.104 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.4.104" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.5 < 3.10.54 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.5 < 3.10.54" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 < 3.12.29 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.12.29" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.13 < 3.14.18 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 < 3.14.18" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.15 < 3.16.2 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.15 < 3.16.2" | - |
Affected
|