CVE-2008-5134
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
18/11/2008
Last modified:
07/11/2023
Description
Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.27.4 (including) | |
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba%3Dcommit%3Bh%3D48735d8d8bd701b1e0cd3d49c21e5e385ddcb077
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
- http://openwall.com/lists/oss-security/2008/11/11/2
- http://secunia.com/advisories/32998
- http://secunia.com/advisories/33641
- http://secunia.com/advisories/33706
- http://secunia.com/advisories/33854
- http://www.debian.org/security/2008/dsa-1681
- http://www.redhat.com/support/errata/RHSA-2009-0053.html
- http://www.securityfocus.com/bid/32484
- https://bugzilla.redhat.com/show_bug.cgi?id=470761
- https://usn.ubuntu.com/714-1/