Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 14 Mar 2013 23:08:39 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Marcus Meissner <meissner@...e.de>
Subject: Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer
 overflow triggered by device

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/14/2013 07:43 AM, Marcus Meissner wrote:
> Hi,
> 
> I am wondering ... do we consider attacks with special attack
> taylored USB devices as CVE worthy?

Yes. I know vendors (like us) hand out USB keys at events (I think
most of ours are live bootable systems, so we should probably make
sure that users can safely plug them in without hosing their systems
if they want to look at what is on it =).

> There is only some precedence in the CVE DB, but not much.
> 
> I stumbled over this fix from one of my colleagues where a
> specifically made USB device reporting the "cdc-wdm" USB class
> could cause a kernel heap overflow.
> 
> "Malicious attached devices" might fall into several categories:
> 
> 1. Attaching the device causes the issue directly within the kernel
> / autoloaded module, without user interaction. (here the case)
> 
> 
> 2. Attaching the device causes the issue when userspace, dependend
> on e.g. desktop system, does initiate a seperate action (like an
> automount and then exploitation of something) (so not direct a
> kernel, but a kernel + GNOME/KDE interaction).
> 
> 
> 3. User needs to do something with the attached device (like click
> on a file on a USB disk)
> 
> 
> I would consider (1) and (2) CVE worthy at least, not so sure with
> (3).
> 
> Ciao, Marcus
> 
> commit c0f5ecee4e741667b2493c742b60b6218d40b3aa Author: Oliver
> Neukum <oneukum@...e.de> Date:   Tue Mar 12 14:52:42 2013 +0100
> 
> USB: cdc-wdm: fix buffer overflow
> 
> The buffer for responses must not overflow. If this would happen,
> set a flag, drop the data and return an error after user space has
> read all remaining data.
> 
> Signed-off-by: Oliver Neukum <oliver@...kum.org> CC:
> stable@...nel.org Signed-off-by: Greg Kroah-Hartman
> <gregkh@...uxfoundation.org>
> 

Please use CVE-2013-1860 for this issue.



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=9mvb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.