8.3 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
7.9 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
79.9%
The Broadcom brcmfmac WiFi driver prior to commit
1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer
overflow. If the Wake-up on Wireless LAN functionality is configured, a
malicious event frame can be constructed to trigger an heap buffer overflow
in the brcmf_wowl_nd_results function. This vulnerability can be exploited
with compromised chipsets to compromise the host, or when used in
combination with CVE-2019-9503, can be used remotely. In the worst case
scenario, by sending specially-crafted WiFi packets, a remote,
unauthenticated attacker may be able to execute arbitrary code on a
vulnerable system. More typically, this vulnerability will result in
denial-of-service conditions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-50.54 | UNKNOWN |
ubuntu | 18.10 | noarch | linux | < 4.18.0-20.21 | UNKNOWN |
ubuntu | 19.04 | noarch | linux | < 5.0.0-15.16 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1039.41 | UNKNOWN |
ubuntu | 18.10 | noarch | linux-aws | < 4.18.0-1016.18 | UNKNOWN |
ubuntu | 19.04 | noarch | linux-aws | < 5.0.0-1006.6 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1039.41~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure | < 4.18.0-1018.18~18.04.1 | UNKNOWN |
ubuntu | 18.10 | noarch | linux-azure | < 4.18.0-1018.18 | UNKNOWN |
ubuntu | 19.04 | noarch | linux-azure | < 5.0.0-1006.6 | UNKNOWN |
blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
launchpad.net/bugs/cve/CVE-2019-9500
nvd.nist.gov/vuln/detail/CVE-2019-9500
security-tracker.debian.org/tracker/CVE-2019-9500
ubuntu.com/security/notices/USN-3979-1
ubuntu.com/security/notices/USN-3980-1
ubuntu.com/security/notices/USN-3980-2
ubuntu.com/security/notices/USN-3981-1
ubuntu.com/security/notices/USN-3981-2
www.cve.org/CVERecord?id=CVE-2019-9500
8.3 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
7.9 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
79.9%