- Description
- The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
- Source
- cret@cert.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.3
- Impact score
- 6
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.9
- Impact score
- 10
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:C/I:C/A:C
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:brcmfmac_driver:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E300306D-8929-403F-BF11-AB86A3414EA1"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "26A52A04-54E8-4081-ABFD-F3F78CFE91D0",
"versionEndExcluding": "4.9.181",
"versionStartIncluding": "4.5"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "963FBC10-799B-4E56-B7FC-D260394C77CC",
"versionEndExcluding": "4.14.123",
"versionStartIncluding": "4.10"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BDFB304D-9D53-4328-ADF8-A05CC880C555",
"versionEndExcluding": "4.19.47",
"versionStartIncluding": "4.15"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F332F557-E7B3-45BB-A03F-0CCF2C6F7987",
"versionEndExcluding": "5.0.20",
"versionStartIncluding": "4.20"
}
],
"operator": "OR"
}
]
}
]