CVE-2015-7833
Ubuntu Security Notice USN-2929-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
El controlador usbvision en el paquete del kernel de Linux 3.10.0-123.20.1.el7 hasta la versión 3.10.0-229.14.1.el7 en Red Hat Enterprise Linux (RHEL) 7.1 permite a atacantes físicamente próximos provocar una denegación de servicio (panic) a través de un valor bInterfaceNumber distinto de cero en un descriptor de dispositivo USB.
Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. It was discovered that the Linux kernel did not properly enforce rlimits for file descriptors sent over UNIX domain sockets. A local attacker could use this to cause a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-10-14 CVE Reserved
- 2015-10-19 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-17: DEPRECATED: Code
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/77030 | Vdb Entry | |
http://www.securitytracker.com/id/1034452 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=1201858 | Issue Tracking |
URL | Date | SRC |
---|---|---|
http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescriptors-UsbvisionDriver.pdf | 2024-08-06 | |
http://www.securityfocus.com/archive/1/536629 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html | 2017-09-13 | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html | 2017-09-13 | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html | 2017-09-13 | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html | 2017-09-13 | |
http://www.debian.org/security/2015/dsa-3396 | 2017-09-13 | |
http://www.debian.org/security/2015/dsa-3426 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2929-1 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2929-2 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2932-1 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2947-1 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2947-2 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2947-3 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2948-1 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2948-2 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2967-1 | 2017-09-13 | |
http://www.ubuntu.com/usn/USN-2967-2 | 2017-09-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Suse Linux Enterprise Real Time Extension Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" | 12 Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" and version "12" | sp1 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.1 Search vendor "Redhat" for product "Enterprise Linux" and version "7.1" | - |
Affected
|