CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
72.1%
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux_enterprise_software_development_kit | 11 | cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* |
novell | suse_linux_enterprise_debuginfo | 11 | cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* |
novell | suse_linux_enterprise_real_time_extension | 11 | cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:* |
novell | suse_linux_enterprise_real_time_extension | 12 | cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:* |
novell | suse_linux_enterprise_server | 11 | cpe:2.3:o:novell:suse_linux_enterprise_server:11:extra:*:*:*:*:*:* |
novell | suse_linux_enterprise_server | 11 | cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:* |
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
www.debian.org/security/2016/dsa-3448
www.debian.org/security/2016/dsa-3503
www.securityfocus.com/archive/1/537733/100/0/threaded
www.securityfocus.com/bid/82975
www.ubuntu.com/usn/USN-2929-1
www.ubuntu.com/usn/USN-2929-2
www.ubuntu.com/usn/USN-2930-1
www.ubuntu.com/usn/USN-2930-2
www.ubuntu.com/usn/USN-2930-3
www.ubuntu.com/usn/USN-2932-1
www.ubuntu.com/usn/USN-2948-1
www.ubuntu.com/usn/USN-2948-2
www.ubuntu.com/usn/USN-2967-1
www.ubuntu.com/usn/USN-2967-2
bugzilla.redhat.com/show_bug.cgi?id=1283371
bugzilla.redhat.com/show_bug.cgi?id=1296466
github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
security-tracker.debian.org/tracker/CVE-2015-7566
www.exploit-db.com/exploits/39540/
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
72.1%