CVE-2019-9501 — Heap-based Buffer Overflow in Wifi Drivers
Severity
8.8HIGHNVD
CNA7.9
EPSS
2.3%
top 15.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 3
Latest updateMay 24
Description
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVSS vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3GHSA
▶
OSV▶
CVE-2019-9501: In driver/firmware of broadcom wifi chipset, there is a possible out of bounds write due to a missing bounds check↗2020-07-01
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2019-15126 linux-firmware: Transmission of data encrypted with an all-zero session key after disassociation↗2020-02-27