Linux Kernel I/O-Warrior USB Device Heap Buffer Overflow Vulnerability

The Linux kernel is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.

Attackers can exploit this issue to execute arbitrary code with superuser privileges, facilitating the complete compromise of affected computers. Failed exploit attempts will likely crash the kernel, denying service to legitimate users.


Privacy Statement
Copyright 2010, SecurityFocus