KCodes NetUSB Kernel Stack Buffer Overflow

by George Chetcuti [Published on 20 May 2015 / Last Updated on 20 May 2015]

NetUSB suffers from a remotely exploitable kernel stack buffer overflow – vulnerability disclosed by SEC Consult.

Because of insufficient input validation, an overly long computer name can be used to overflow the "computer name" kernel stack buffer. This results in memory corruption which can be turned into arbitrary remote code execution.

Read SEC Consult Advisory here - https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt

See Also


Review and Comments

See Also