9.8

CVE-2019-17133

In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.6.32 < 3.16.77
LinuxLinux Kernel Version >= 3.17 < 4.4.198
LinuxLinux Kernel Version >= 4.5 < 4.9.198
LinuxLinux Kernel Version >= 4.10 < 4.14.151
LinuxLinux Kernel Version >= 4.15 < 4.19.81
LinuxLinux Kernel Version >= 4.20 < 5.3.8
DebianDebian Linux Version8.0
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
OpensuseLeap Version15.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.56% 0.809
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

https://usn.ubuntu.com/4211-1/
Third Party Advisory
https://usn.ubuntu.com/4211-2/
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/11
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4226-1/
Third Party Advisory
https://usn.ubuntu.com/4210-1/
Third Party Advisory
https://usn.ubuntu.com/4208-1/
Third Party Advisory
https://marc.info/?l=linux-wireless&m=157018270915487&w=2
Patch
Third Party Advisory
Mailing List