{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2015-05-13T00:00:00.000Z","descriptions":[{"lang":"en","value":"The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-11-25T19:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"USN-3004-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3004-1"},{"name":"74669","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/74669"},{"name":"[linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lkml.org/lkml/2015/5/13/739"},{"name":"USN-3001-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3001-1"},{"name":"USN-3000-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3000-1"},{"name":"USN-3002-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3002-1"},{"name":"USN-2989-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2989-1"},{"name":"[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities","tags":["mailing-list","x_refsource_MLIST"],"url":"http://openwall.com/lists/oss-security/2015/06/05/7"},{"name":"USN-3003-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-3003-1"},{"name":"USN-2998-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2998-1"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-4004","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"USN-3004-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3004-1"},{"name":"74669","refsource":"BID","url":"http://www.securityfocus.com/bid/74669"},{"name":"[linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities","refsource":"MLIST","url":"https://lkml.org/lkml/2015/5/13/739"},{"name":"USN-3001-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3001-1"},{"name":"USN-3000-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3000-1"},{"name":"USN-3002-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3002-1"},{"name":"USN-2989-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2989-1"},{"name":"[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities","refsource":"MLIST","url":"http://openwall.com/lists/oss-security/2015/06/05/7"},{"name":"USN-3003-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3003-1"},{"name":"USN-2998-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2998-1"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T06:04:02.838Z"},"title":"CVE Program Container","references":[{"name":"USN-3004-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3004-1"},{"name":"74669","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/74669"},{"name":"[linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lkml.org/lkml/2015/5/13/739"},{"name":"USN-3001-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3001-1"},{"name":"USN-3000-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3000-1"},{"name":"USN-3002-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3002-1"},{"name":"USN-2989-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2989-1"},{"name":"[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://openwall.com/lists/oss-security/2015/06/05/7"},{"name":"USN-3003-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-3003-1"},{"name":"USN-2998-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2998-1"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2015-4004","datePublished":"2015-06-07T23:00:00.000Z","dateReserved":"2015-05-15T00:00:00.000Z","dateUpdated":"2024-08-06T06:04:02.838Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}