First published: Fri Jul 15 2011(Updated: )
A buffer overflow flaw was found in the Linux kernel's Auerswald PBX/System Telephone usb driver implementation. There's no upstream patch as the affected driver was removed from the kernel in 2.6.27. For more information, check out the references: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4067">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4067</a> <a href="http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf">http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf</a> Acknowledgement: Red Hat would like to thank Rafael Dominguez Vega for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.27 | |
Red Hat Enterprise Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4067 is assigned a high severity rating due to its buffer overflow vulnerability in the Linux kernel's USB driver.
The specific driver affected by CVE-2009-4067 has been removed from the kernel as of version 2.6.27, so upgrading to this version or later is recommended.
CVE-2009-4067 affects Linux kernels up to version 2.6.26 and specific systems like Red Hat Enterprise Linux 4.0.
There is no official patch for CVE-2009-4067 as the affected USB driver has been removed from the kernel.
CVE-2009-4067 is a buffer overflow vulnerability that can potentially allow attackers to execute arbitrary code.