This flaw allows a local user to crash the system or potentially cause a denial of service. The message from user space is not checked properly before transferring into the device. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. VDB-229850 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The attack needs to be approached locally. The manipulation leads to null pointer dereference. Affected by this issue is the function 0x220448/0x220420/0x22040c/0x220408 of the component IoControlCode Handler. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S10 20.2 versions prior to 20.2R3-S7 20.3 versions prior to 20.3R3-S6 20.4 versions prior to 20.4R3-S5 21.1 versions prior to 21.1R3-S4 21.2 versions prior to 21.2R3-S4 21.3 versions prior to 21.3R3-S3 21.4 versions prior to 21.4R3-S2 22.1 versions prior to 22.1R2-S2, 22.1R3 22.2 versions prior to 22.2R2, 22.2R3 22.3 versions prior to 22.3R1-S1, 22.3R2 22.4 versions prior to 22.4R2.Ī vulnerability was found in FabulaTech USB for Remote Desktop 6.1.0.0. The device will continue to crash as long as the USB device is connected. When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. Affected devices have firmware versions prior to magicJack A921 USB Phone Jack Rev 3.0 V1.4.Īn Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS). Attackers can exploit this by replacing the original software with a malicious version, leading to ransomware deployment on the host computer. The MagicJack device, a VoIP solution for internet phone calls, contains a hidden NAND flash memory partition allowing unauthorized read/write access. Through the file sharing feature, it is possible to share an arbitrary directory, such as /tmp or /etc, because there is no server-side restriction to limit sharing to the USB path. A path traversal issue was discovered on GL.iNet devices before 3.216.
0 Comments
Leave a Reply. |