Vulnerability Details : CVE-2015-3036
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005.
Vulnerability category: OverflowExecute code
Products affected by CVE-2015-3036
- cpe:2.3:a:kcodes:netusb:-:*:*:*:*:linux:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3036
38.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3036
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2015-3036
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3036
-
http://www.kb.cert.org/vuls/id/177092
VU#177092 - KCodes NetUSB kernel driver is vulnerable to buffer overflowThird Party Advisory;US Government Resource
-
http://seclists.org/fulldisclosure/2015/Oct/50
Full Disclosure: Exploit NetUSB CVE-2015-3036
-
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt
-
http://www.securityfocus.com/bid/74724
KCodes NetUSB CVE-2015-3036 Buffer Overflow Vulnerability
-
http://seclists.org/fulldisclosure/2015/May/74
Full Disclosure: SEC Consult SA-20150519-0 :: Critical buffer overflow vulnerability in KCodes NetUSB (VU#177092, CVE-2015-3036)
-
https://www.exploit-db.com/exploits/38566/
NetUSB - Kernel Stack Buffer Overflow
-
http://blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.html
KCodes NetUSB: How a Small Taiwanese Software Company Can Impact the Security of Millions of Devices Worldwide | SEC Consult
-
http://www.securitytracker.com/id/1032377
NETGEAR Router KCodes NetUSB Driver Buffer Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html
NetUSB Stack Buffer Overflow ≈ Packet Storm
-
https://www.exploit-db.com/exploits/38454/
Linux/MIPS Kernel 2.6.36 - 'NetUSB' Remote Code Execution
-
http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html
KCodes NetUSB Buffer Overflow ≈ Packet Storm
Jump to