Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/11981 | third party advisory vendor advisory |
http://www.osvdb.org/7345 | vdb entry |
http://securitytracker.com/id?1010617 | vdb entry |
http://www.osvdb.org/8363 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2004-06/0463.html | mailing list exploit |
http://www.debian.org/security/2008/dsa-1503 | vendor advisory |
http://secunia.com/advisories/29058 | third party advisory |
http://www.securiteam.com/unixfocus/5GP0515DFW.html | exploit |
http://www.securityfocus.com/bid/10632 | vdb entry |