Логотип exploitDog
bind:CVE-2019-9503
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9503

Количество 23

Количество 23

ubuntu логотип

CVE-2019-9503

больше 5 лет назад

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 7.9
EPSS: Низкий
redhat логотип

CVE-2019-9503

больше 6 лет назад

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2019-9503

больше 5 лет назад

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 7.9
EPSS: Низкий
debian логотип

CVE-2019-9503

больше 5 лет назад

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c ...

CVSS3: 7.9
EPSS: Низкий
github логотип

GHSA-6g85-84jx-q393

около 3 лет назад

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 8.3
EPSS: Низкий
fstec логотип

BDU:2020-02045

больше 6 лет назад

Уязвимость функции is_wlc_event_frame драйвер Broadcom brcmfmac WiFi ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS3: 8.3
EPSS: Низкий
oracle-oval логотип

ELSA-2020-5671

около 5 лет назад

ELSA-2020-5671: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
msrc логотип

ADV190017

около 6 лет назад

Microsoft HoloLens Remote Code Execution Vulnerabilities

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2703

почти 6 лет назад

ELSA-2019-2703: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1244-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1242-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1241-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1240-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1245-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1479-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1404-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1407-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1287-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5670

около 5 лет назад

ELSA-2020-5670: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1016

около 5 лет назад

ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9503

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 7.9
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-9503

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 5.9
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-9503

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 7.9
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-9503

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c ...

CVSS3: 7.9
0%
Низкий
больше 5 лет назад
github логотип
GHSA-6g85-84jx-q393

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

CVSS3: 8.3
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-02045

Уязвимость функции is_wlc_event_frame драйвер Broadcom brcmfmac WiFi ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS3: 8.3
0%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2020-5671

ELSA-2020-5671: Unbreakable Enterprise kernel security update (IMPORTANT)

около 5 лет назад
msrc логотип
ADV190017

Microsoft HoloLens Remote Code Execution Vulnerabilities

около 6 лет назад
oracle-oval логотип
ELSA-2019-2703

ELSA-2019-2703: kernel security and bug fix update (IMPORTANT)

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1244-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1242-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1241-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1240-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1245-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1479-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1404-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1407-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1287-1

Security update for the Linux Kernel

около 6 лет назад
oracle-oval логотип
ELSA-2020-5670

ELSA-2020-5670: Unbreakable Enterprise kernel security update (IMPORTANT)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1016

ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE)

около 5 лет назад

Уязвимостей на страницу