CVE-2011-1180

Published: 25 July 2011

Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.

From the Ubuntu security team

Dan Rosenberg discovered that the IRDA subsystem did not correctly check certain field sizes. If a system was using IRDA, a remote attacker could send specially crafted traffic to crash the system or gain root privileges.

Priority

Low

CVSS 3 base score: 9.8

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by d370af0ef7951188daeb15bae75db7ba57c67846
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39~rc1)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.