ID

VAR-201505-0408


CVE

CVE-2015-3036


TITLE

KCodes NetUSB kernel driver is vulnerable to buffer overflow

Trust: 0.8

sources: CERT/CC: VU#177092

DESCRIPTION

Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005. KCodes NetUSB is vulnerable to a buffer overflow via the network that may result in a denial of service or code execution. KCodes NetUSB The kernel driver contains a buffer overflow vulnerability. KCodes NetUSB Is Linux Connected to base embedded devices (home router products, etc.) USB Share devices on the network "USB over IP" To realize the function, Linux Kernel module. Buffer overflow (CWE-120) - CVE-2015-3036 http://cwe.mitre.org/data/definitions/120.html The client NetUSB The data to send when connecting to the server NetUSB A buffer overflow can occur because the kernel driver does not validate properly. For more information SEC Consult Please check the advisory for. SEC Consult Vulnerability Lab Security Advisory < 20150519-0 > https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt In addition, National Vulnerability Database (NVD) Then CWE-119 It is published as CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer ( Buffer error ) http://cwe.mitre.org/data/definitions/119.htmlAn attacker on the local network caused a buffer overflow, resulting in a denial of service operation (DoS) An attacker may be able to attack or execute arbitrary code. Depending on the default settings of the device, a remote attack may be possible. KCodes NetUSB is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. SEC Consult Vulnerability Lab Security Advisory < 20150519-0 > ======================================================================= title: Kernel Stack Buffer Overflow product: KCodes NetUSB vulnerable version: see Vulnerable / tested versions fixed version: see Solution CVE number: CVE-2015-3036, VU#177092 impact: Critical homepage: http://www.kcodes.com/ found: 2015-02-23 by: Stefan Viehböck (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Berlin - Frankfurt/Main - Montreal - Singapore Vienna (HQ) - Vilnius - Zurich https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "The world's premier technology provider of mobile printing, audio and video communication, file sharing, and USB applications for iPhones, iPads, smart phones and tablets (Android and Windows), MacBooks, and Ultrabooks." Source: http://www.kcodes.com/ Vulnerability overview/description: ----------------------------------- NetUSB suffers from a remotely exploitable kernel stack buffer overflow. Because of insufficient input validation, an overly long computer name can be used to overflow the "computer name" kernel stack buffer. This results in memory corruption which can be turned into arbitrary remote code execution. Furthermore, a more detailed summary of this advisory has been published at our blog: http://blog.sec-consult.com Proof of concept: ----------------- Below is an excerpt from the vulnerable run_init_sbus() function (pseudo code): int computername_len; char computername_buf[64]; // connection initiation, handshake len = ks_recv(sock, &computername_len, 4, 0); // ... len = ks_recv(sock, computername_buf, computername_len, 0); // boom! A proof of concept "netusb_bof.py" has been developed which exploits the vulnerability. The PoC DoS exploit will not be published as many vendors did not patch the vulnerability yet. Example use that results in denial-of-service (kernel memory corruption that results in a device reboot): ./netusb_bof.py 192.168.1.1 20005 500 Vulnerable / tested versions: ----------------------------- The vulnerability has been verified to exist in most recent firmware versions of the following devives: TP-Link TL-WDR4300 V1 TP-Link WR1043ND v2 NETGEAR WNDR4500 Furthermore we've identified NetUSB in the most recent firmware version of the following products (list is not necessarily complete!): D-Link DIR-615 C NETGEAR AC1450 NETGEAR CENTRIA (WNDR4700/4720) NETGEAR D6100 NETGEAR D6200 NETGEAR D6300 NETGEAR D6400 NETGEAR DC112A NETGEAR DC112A (Zain) NETGEAR DGND4000 NETGEAR EX6200 NETGEAR EX7000 NETGEAR JNR3000 NETGEAR JNR3210 NETGEAR JR6150 NETGEAR LG6100D NETGEAR PR2000 NETGEAR R6050 NETGEAR R6100 NETGEAR R6200 NETGEAR R6200v2 NETGEAR R6220 NETGEAR R6250 NETGEAR R6300v1 NETGEAR R6300v2 NETGEAR R6700 NETGEAR R7000 NETGEAR R7500 NETGEAR R7900 NETGEAR R8000 NETGEAR WN3500RP NETGEAR WNDR3700v5 NETGEAR WNDR4300 NETGEAR WNDR4300v2 NETGEAR WNDR4500 NETGEAR WNDR4500v2 NETGEAR WNDR4500v3 NETGEAR XAU2511 NETGEAR XAUB2511 TP-LINK Archer C2 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer C20 V1.0 (Not affected) TP-LINK Archer C20i V1.0 (Fix planned before 2015/05/25) TP-LINK Archer C5 V1.2 (Fix planned before 2015/05/22) TP-LINK Archer C5 V2.0 (Fix planned before 2015/05/30) TP-LINK Archer C7 V1.0 (Fix planned before 2015/05/30) TP-LINK Archer C7 V2.0 (Fix already released) TP-LINK Archer C8 V1.0 (Fix planned before 2015/05/30) TP-LINK Archer C9 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer D2 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer D5 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer D7 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer D7B V1.0 (Fix planned before 2015/05/31) TP-LINK Archer D9 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer VR200v V1.0 (Fix already released) TP-LINK TD-VG3511 V1.0 (End-Of-Life) TP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/31) TP-LINK TD-W1042ND V1.0 (End-Of-Life) TP-LINK TD-W1043ND V1.0 (End-Of-Life) TP-LINK TD-W8968 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8968 V2.0 (Fix planned before 2015/05/30) TP-LINK TD-W8968 V3.0 (Fix planned before 2015/05/25) TP-LINK TD-W8970 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8970 V3.0 (Fix already released) TP-LINK TD-W8970B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8980 V3.0 (Fix planned before 2015/05/25) TP-LINK TD-W8980B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W9980 V1.0 (Fix already released) TP-LINK TD-W9980B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-WDR4900 V1.0 (End-Of-Life) TP-LINK TL-WR1043ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR1043ND V3.0 (Fix planned before 2015/05/30) TP-LINK TL-WR1045ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR3500 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR3600 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR4300 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR842ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR842ND V1.0 (End-Of-Life) TP-LINK TX-VG1530(GPON) V1.0 (Fix planned before 2015/05/31) Trendnet TE100-MFP1 (v1.0R) Trendnet TEW-632BRP (A1.0R) Trendnet TEW-632BRP (A1.1R/A1.2R) Trendnet TEW-632BRP (A1.1R/A1.2R/A1.3R) Trendnet TEW-634GRU (v1.0R) Trendnet TEW-652BRP (V1.0R) Trendnet TEW-673GRU (v1.0R) Trendnet TEW-811DRU (v1.0R) Trendnet TEW-812DRU (v1.0R) Trendnet TEW-812DRU (v2.xR) Trendnet TEW-813DRU (v1.0R) Trendnet TEW-818DRU (v1.0R) Trendnet TEW-823DRU (v1.0R) Trendnet TEW-MFP1 (v1.0R) Zyxel NBG-419N v2 Zyxel NBG4615 v2 Zyxel NBG5615 Zyxel NBG5715 Based on information embedded in KCodes drivers we believe the following vendors are affected: Allnet Ambir Technology AMIT Asante Atlantis Corega Digitus D-Link EDIMAX Encore Electronics Engenius Etop Hardlink Hawking IOGEAR LevelOne Longshine NETGEAR PCI PROLiNK Sitecom Taifa TP-LINK TRENDnet Western Digital ZyXEL Vendor contact timeline: ------------------------ 2015-02-28: Contacting vendor through support@kcodes.com 2015-03-04: No response, contacting various KCodes addresses found on the web. 2015-03-05: Vendor responds, requests more information. 2015-03-05: Providing advisory and proof of concept exploit. 2015-03-16: No response, requesting status update. 2015-03-16: Vendor responds, asks about fix verification(?) 2015-03-16: Requesting clarification about fixing status and information about next steps. Proposing conference call dates. 2015-03-19: No response, informing that notification of CERT/CC and selected vendors will start shortly. Requesting clarification about fixing status and information about next steps again. 2015-03-19: Vendor responds, confirms conference call date (2015-03-25). No further information provided. 2015-03-19: Providing advisory and proof of concept exploit to TP-LINK and NETGEAR. 2015-03-25: Vendor cancels conference call on short notice (sudden week-long business trip). 2015-03-26: Asking for support of CERT/CC regarding vendor coordination. 2015-03 - 2015-05: Coordination between CERT & vendors, NETGEAR and TP-LINK 2015-05-13: Notifying German CERT-Bund and Austrian CERT.at 2015-05-19: Coordinated release of security advisory Solution: --------- TP-LINK has started releasing fixed firmware. The status of affected products can be found in the affected product list above. For additional information also see CERT/CC vulnerability notice: http://www.kb.cert.org/vuls/id/177092 Workaround: ----------- Sometimes NetUSB can be disabled via the web interface, but at least on NETGEAR devices this does not mitigate the vulnerability. NETGEAR told us, that there is no workaround available, the TCP port can't be firewalled nor is there a way to disable the service on their devices. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/Career.htm Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/About/Contact.htm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF Stefan Viehböck / @2015

Trust: 2.79

sources: NVD: CVE-2015-3036 // CERT/CC: VU#177092 // JVNDB: JVNDB-2015-002741 // BID: 74724 // VULMON: CVE-2015-3036 // PACKETSTORM: 131987

AFFECTED PRODUCTS

vendor:kcodesmodel:netusbscope:eqversion: -

Trust: 1.6

vendor:trendnetmodel:tew-632brpscope: - version: -

Trust: 1.2

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:kcodesmodel: - scope: - version: -

Trust: 0.8

vendor:netgearmodel: - scope: - version: -

Trust: 0.8

vendor:tp linkmodel: - scope: - version: -

Trust: 0.8

vendor:trendnetmodel: - scope: - version: -

Trust: 0.8

vendor:zyxelmodel: - scope: - version: -

Trust: 0.8

vendor:multiple vendorsmodel: - scope: - version: -

Trust: 0.8

vendor:trendnetmodel:tew-812druscope: - version: -

Trust: 0.6

vendor:zyxelmodel:nbg5715scope:eqversion:0

Trust: 0.3

vendor:zyxelmodel:nbg5615scope:eqversion:0

Trust: 0.3

vendor:zyxelmodel:nbg4615scope:eqversion:v2

Trust: 0.3

vendor:zyxelmodel:nbg-419nscope:eqversion:v20

Trust: 0.3

vendor:trendnetmodel:tew-mfp1scope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-823druscope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-818druscope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-813druscope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-811druscope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-673gruscope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-652brpscope: - version: -

Trust: 0.3

vendor:trendnetmodel:tew-634gruscope: - version: -

Trust: 0.3

vendor:trendnetmodel:te100-mfp1scope: - version: -

Trust: 0.3

vendor:tp linkmodel:tx-vg1530scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:tl-wr842ndscope:eqversion:2.0

Trust: 0.3

vendor:tp linkmodel:tl-wr842ndscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:tl-wr4300scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:tl-wr3600scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:tl-wr3500scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:tl-wr1045ndscope:eqversion:2.0

Trust: 0.3

vendor:tp linkmodel:tl-wr1043ndscope:eqversion:3.0

Trust: 0.3

vendor:tp linkmodel:tl-wr1043ndscope:eqversion:2.0

Trust: 0.3

vendor:tp linkmodel:td-wdr4900scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w9980bscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w9980scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w8980bscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w8980scope:eqversion:3.0

Trust: 0.3

vendor:tp linkmodel:td-w8970bscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w8970scope:eqversion:3.0

Trust: 0.3

vendor:tp linkmodel:td-w8970scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w8968scope:eqversion:3.0

Trust: 0.3

vendor:tp linkmodel:td-w8968scope:eqversion:2.0

Trust: 0.3

vendor:tp linkmodel:td-w8968scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w1043ndscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-w1042ndscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-vg3631scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:td-vg3511scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer vr200vscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer d9scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer d7bscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer d7scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer d5scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer d2scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer c7scope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer c5scope:eqversion:2.0

Trust: 0.3

vendor:tp linkmodel:archer c20iscope:eqversion:1.0

Trust: 0.3

vendor:tp linkmodel:archer c2scope:eqversion:1.0

Trust: 0.3

vendor:netgearmodel:xaub2511scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:xau2511scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wndr4500v3scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wndr4500v2scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wndr4500scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wndr4300v2scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wndr4300scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wndr3700v5scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:wn3500rpscope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r8000scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r7900scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r7500scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r7000scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6700scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6300v2scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6300v1scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6250scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6220scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6200v2scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6200scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6100scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:r6050scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:pr2000scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:lg6100dscope:eqversion:0

Trust: 0.3

vendor:netgearmodel:jr6150scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:jnr3000scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:ex7000scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:ex6200scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:dgnd4000scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:dc112ascope:eqversion:0

Trust: 0.3

vendor:netgearmodel:d6400scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:d6300scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:d6200scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:d6100scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:centria wndr4720scope: - version: -

Trust: 0.3

vendor:netgearmodel:centria wndr4700scope: - version: -

Trust: 0.3

vendor:netgearmodel:ac1450scope:eqversion:0

Trust: 0.3

vendor:kcodesmodel:netusbscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dir-685scope:eqversion:2.00

Trust: 0.3

vendor:d linkmodel:dir-615scope:eqversion:3.13

Trust: 0.3

sources: CERT/CC: VU#177092 // BID: 74724 // JVNDB: JVNDB-2015-002741 // CNNVD: CNNVD-201505-429 // NVD: CVE-2015-3036

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3036
value: HIGH

Trust: 1.0

NVD: CVE-2015-3036
value: MEDIUM

Trust: 0.8

NVD: CVE-2015-3036
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201505-429
value: CRITICAL

Trust: 0.6

VULMON: CVE-2015-3036
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-3036
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

NVD: CVE-2015-3036
severity: MEDIUM
baseScore: 5.7
vectorString: NONE
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#177092 // VULMON: CVE-2015-3036 // JVNDB: JVNDB-2015-002741 // CNNVD: CNNVD-201505-429 // NVD: CVE-2015-3036

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-002741 // NVD: CVE-2015-3036

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-429

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201505-429

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002741

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#177092 // VULMON: CVE-2015-3036

PATCH

title:USB Over IP (NetUSB)url:http://www.kcodes.com/product/usb_01.html

Trust: 0.8

title:The Registerurl:https://www.theregister.co.uk/2015/05/20/netusb_router_fail/

Trust: 0.2

title:TD-W8970-NetUSB-Fix-v1-url:https://github.com/Leproide/TD-W8970-NetUSB-Fix-v1-

Trust: 0.1

title:NetUSB-exploiturl:https://github.com/funsecurity/NetUSB-exploit

Trust: 0.1

title:MiraiSecurityurl:https://github.com/pandazheng/MiraiSecurity

Trust: 0.1

title:Threatposturl:https://threatpost.com/details-surface-on-unpatched-kcodes-netusb-bug/112910/

Trust: 0.1

sources: VULMON: CVE-2015-3036 // JVNDB: JVNDB-2015-002741

EXTERNAL IDS

db:CERT/CCid:VU#177092

Trust: 3.7

db:NVDid:CVE-2015-3036

Trust: 2.9

db:BIDid:74724

Trust: 1.4

db:PACKETSTORMid:131987

Trust: 1.2

db:SECTRACKid:1032377

Trust: 1.1

db:PACKETSTORMid:133919

Trust: 1.1

db:EXPLOIT-DBid:38566

Trust: 1.1

db:EXPLOIT-DBid:38454

Trust: 1.1

db:JVNid:JVNVU90185396

Trust: 0.8

db:JVNDBid:JVNDB-2015-002741

Trust: 0.8

db:CNNVDid:CNNVD-201505-429

Trust: 0.6

db:DLINKid:SAP10057

Trust: 0.3

db:VULMONid:CVE-2015-3036

Trust: 0.1

sources: CERT/CC: VU#177092 // VULMON: CVE-2015-3036 // BID: 74724 // JVNDB: JVNDB-2015-002741 // PACKETSTORM: 131987 // CNNVD: CNNVD-201505-429 // NVD: CVE-2015-3036

REFERENCES

url:https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_kcodes_netusb_kernel_stack_buffer_overflow_v10.txt

Trust: 3.6

url:http://blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.html

Trust: 3.3

url:http://www.kb.cert.org/vuls/id/177092

Trust: 2.9

url:http://www.securityfocus.com/bid/74724

Trust: 1.2

url:https://www.exploit-db.com/exploits/38566/

Trust: 1.2

url:http://securityadvisories.dlink.com/security/publication.aspx?name=sap10057

Trust: 1.1

url:http://packetstormsecurity.com/files/131987/kcodes-netusb-buffer-overflow.html

Trust: 1.1

url:http://seclists.org/fulldisclosure/2015/may/74

Trust: 1.1

url:http://www.securitytracker.com/id/1032377

Trust: 1.1

url:http://packetstormsecurity.com/files/133919/netusb-stack-buffer-overflow.html

Trust: 1.1

url:http://seclists.org/fulldisclosure/2015/oct/50

Trust: 1.1

url:https://www.exploit-db.com/exploits/38454/

Trust: 1.1

url:http://kb.netgear.com/app/answers/detail/a_id/28393/

Trust: 0.8

url:http://www.trendnet.com/support/view.asp?cat=4&id=58

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3036

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90185396/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3036

Trust: 0.8

url:http://www.kcodes.com/product/usb_01.html

Trust: 0.3

url:https://github.com/funsecurity/netusb-exploit

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://github.com/leproide/td-w8970-netusb-fix-v1-

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.sec-consult.com/en/career.htm

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3036

Trust: 0.1

url:https://www.sec-consult.com

Trust: 0.1

url:https://www.sec-consult.com/en/about/contact.htm

Trust: 0.1

url:https://twitter.com/sec_consult

Trust: 0.1

url:http://blog.sec-consult.com

Trust: 0.1

url:http://www.kcodes.com/

Trust: 0.1

url:https://www.sec-consult.com/en/vulnerability-lab/advisories.htm

Trust: 0.1

sources: CERT/CC: VU#177092 // VULMON: CVE-2015-3036 // BID: 74724 // JVNDB: JVNDB-2015-002741 // PACKETSTORM: 131987 // CNNVD: CNNVD-201505-429 // NVD: CVE-2015-3036

CREDITS

Stefan Viehböck from SEC Consult Vulnerability Lab

Trust: 0.3

sources: BID: 74724

SOURCES

db:CERT/CCid:VU#177092
db:VULMONid:CVE-2015-3036
db:BIDid:74724
db:JVNDBid:JVNDB-2015-002741
db:PACKETSTORMid:131987
db:CNNVDid:CNNVD-201505-429
db:NVDid:CVE-2015-3036

LAST UPDATE DATE

2024-11-23T23:09:15.345000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#177092date:2015-06-05T00:00:00
db:VULMONid:CVE-2015-3036date:2016-12-08T00:00:00
db:BIDid:74724date:2015-12-08T22:03:00
db:JVNDBid:JVNDB-2015-002741date:2015-05-22T00:00:00
db:CNNVDid:CNNVD-201505-429date:2015-05-21T00:00:00
db:NVDid:CVE-2015-3036date:2024-11-21T02:28:31.787

SOURCES RELEASE DATE

db:CERT/CCid:VU#177092date:2015-05-19T00:00:00
db:VULMONid:CVE-2015-3036date:2015-05-21T00:00:00
db:BIDid:74724date:2015-05-19T00:00:00
db:JVNDBid:JVNDB-2015-002741date:2015-05-21T00:00:00
db:PACKETSTORMid:131987date:2015-05-21T14:44:44
db:CNNVDid:CNNVD-201505-429date:2015-05-21T00:00:00
db:NVDid:CVE-2015-3036date:2015-05-21T01:59:27.087