8.3
CVE-2019-9500
- EPSS 3.47%
- Veröffentlicht 16.01.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 04:51:44
- Quelle cret@cert.org
- Teams Watchlist Login
- Unerledigt Login
The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Broadcom ≫ Brcmfmac Driver Version-
Linux ≫ Linux Kernel Version >= 4.5 < 4.9.181
Linux ≫ Linux Kernel Version >= 4.10 < 4.14.123
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.47
Linux ≫ Linux Kernel Version >= 4.20 < 5.0.20
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.47% | 0.871 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.3 | 1.6 | 6 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
nvd@nist.gov | 7.9 | 5.5 | 10 |
AV:A/AC:M/Au:N/C:C/I:C/A:C
|
cret@cert.org | 7.9 | 1.2 | 6 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
|
CWE-122 Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.