Vigil@nce - Linux kernel: buffer overflow via caiaq
February 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
An attacker can insert a USB device with a long name, in order to create an overflow in caiaq, leading to a denial of service or to code execution.
Creation date: 16/02/2011
DESCRIPTION OF THE VULNERABILITY
The sound/usb/caiaq directory implements the support of USB devices from the Native Instruments company.
The snd_usb_caiaq_audio_init() and snd_usb_caiaq_midi_init() functions copy the name of the USB device in a 80 bytes array. However, if the name provided by the USB device is longer, a buffer overflow occurs.
An attacker can therefore insert a USB device with a long name, in order to create an overflow in caiaq, leading to a denial of service or to code execution.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN