{"api_version":"1","generated_at":"2026-04-23T07:55:35+00:00","cve":"CVE-2015-4004","urls":{"html":"https://cve.report/CVE-2015-4004","api":"https://cve.report/api/cve/CVE-2015-4004.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-4004","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-4004"},"summary":{"title":"CVE-2015-4004","description":"The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2015-06-07 23:59:00","updated_at":"2022-12-12 20:21:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://lkml.org/lkml/2015/5/13/739","name":"[linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities","refsource":"MLIST","tags":["Exploit","Vendor Advisory"],"title":"LKML: \"Jason A. Donenfeld\": [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3000-1","name":"USN-3000-1","refsource":"UBUNTU","tags":[],"title":"USN-3000-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2998-1","name":"USN-2998-1","refsource":"UBUNTU","tags":[],"title":"USN-2998-1: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3001-1","name":"USN-3001-1","refsource":"UBUNTU","tags":[],"title":"USN-3001-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3004-1","name":"USN-3004-1","refsource":"UBUNTU","tags":[],"title":"USN-3004-1: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3002-1","name":"USN-3002-1","refsource":"UBUNTU","tags":[],"title":"USN-3002-1: Linux kernel (Wily HWE) vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://openwall.com/lists/oss-security/2015/06/05/7","name":"[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2989-1","name":"USN-2989-1","refsource":"UBUNTU","tags":[],"title":"USN-2989-1: Linux kernel vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3003-1","name":"USN-3003-1","refsource":"UBUNTU","tags":[],"title":"USN-3003-1: Linux kernel vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/74669","name":"74669","refsource":"BID","tags":[],"title":"Linux Kernel 'ozwpan' Driver Out Of Bounds Read Multiple Memory Corruption Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-4004","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4004","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"15.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"15.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4004","vulnerable":"1","versionEndIncluding":"4.0.5","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2015-4004","qid":"671047","title":"EulerOS Security Update for kernel (EulerOS-SA-2021-2588)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-4004","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"USN-3004-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3004-1"},{"name":"74669","refsource":"BID","url":"http://www.securityfocus.com/bid/74669"},{"name":"[linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities","refsource":"MLIST","url":"https://lkml.org/lkml/2015/5/13/739"},{"name":"USN-3001-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3001-1"},{"name":"USN-3000-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3000-1"},{"name":"USN-3002-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3002-1"},{"name":"USN-2989-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2989-1"},{"name":"[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities","refsource":"MLIST","url":"http://openwall.com/lists/oss-security/2015/06/05/7"},{"name":"USN-3003-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-3003-1"},{"name":"USN-2998-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2998-1"}]}},"nvd":{"publishedDate":"2015-06-07 23:59:00","lastModifiedDate":"2022-12-12 20:21:00","problem_types":["CWE-119"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"COMPLETE","baseScore":8.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":7.8,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"4.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"4004","Ordinal":"80959","Title":"CVE-2015-4004","CVE":"CVE-2015-4004","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"4004","Ordinal":"1","NoteData":"The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.","Type":"Description","Title":null},{"CveYear":"2015","CveId":"4004","Ordinal":"2","NoteData":"2015-06-07","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"4004","Ordinal":"3","NoteData":"2016-11-25","Type":"Other","Title":"Modified"}]}}}