Vigil@nce - Linux kernel: buffer overflow via caiaq
February 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
An attacker can insert a USB device with a long name, in order to
create an overflow in caiaq, leading to a denial of service or to
code execution.
Severity: 1/4
Creation date: 16/02/2011
IMPACTED PRODUCTS
– Linux kernel
DESCRIPTION OF THE VULNERABILITY
The sound/usb/caiaq directory implements the support of USB
devices from the Native Instruments company.
The snd_usb_caiaq_audio_init() and snd_usb_caiaq_midi_init()
functions copy the name of the USB device in a 80 bytes array.
However, if the name provided by the USB device is longer, a
buffer overflow occurs.
An attacker can therefore insert a USB device with a long name, in
order to create an overflow in caiaq, leading to a denial of
service or to code execution.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-via-caiaq-10373