HIGH · 8.5

CVE-2015-4004

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause...

Vulnerability Description

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.

CVSS Score

8.5

HIGH

AV:N/AC:L/Au:N/C:P/I:N/A:C
Confidentiality
PARTIAL
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux12.04
LinuxLinux Kernel>= 3.4, < 4.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4004?

CVE-2015-4004 is a vulnerability with a CVSS score of 8.5 (HIGH). The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause...

How severe is CVE-2015-4004?

CVE-2015-4004 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4004?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Linux Linux Kernel.