Vigil@nce: Linux kernel, buffer overflow of Applicom
December 2008 by Vigil@nce
A local attacker can create a buffer overflow in the Applicom
driver in order to elevate his privileges.
– Gravity: 2/4
– Consequences: administrator access/rights
– Provenance: user account
– Means of attack: no proof of concept, no attack
– Ability of attacker: expert (4/4)
– Confidence: confirmed by the editor (5/5)
– Diffusion of the vulnerable configuration: medium (2/3)
– Creation date: 10/12/2008
IMPACTED PRODUCTS
– Linux kernel
DESCRIPTION
The char/applicom.c driver implements the support of Applicom
industrial cards.
The ac_ioctl() function does not correctly check the number of the
requested card.
A local attacker can therefore use a malicious ioctl in order to
create a buffer overflow, leading to code execution in the kernel.
CHARACTERISTICS
– Identifiers: 11408, BID-32759, VIGILANCE-VUL-8313
– Url: http://vigilance.fr/vulnerability/8313