Vigil@nce - Linux kernel: buffer overflow of qeth_snmp_command
December 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in the
qeth_snmp_command() function of the Linux kernel, in order to
trigger a denial of service, and possibly to execute code.
– Impacted products: Linux
– Severity: 2/4
– Creation date: 25/11/2013
DESCRIPTION OF THE VULNERABILITY
The qeth driver is used on s390 architectures.
However, if the size of SNMP data is greater than the size of the
storage array, an overflow occurs in the qeth_snmp_command()
function.
An attacker can therefore generate a buffer overflow in the
qeth_snmp_command() function of the Linux kernel, in order to
trigger a denial of service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-of-qeth-snmp-command-13823