ID

VAR-202002-0374


CVE

CVE-2019-9501


TITLE

Broadcom WiFi chipset drivers contain multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#166939

DESCRIPTION

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. Broadcom Made Wi-Fi For chipset Broadcom wl Drivers and open source brcmfmac There are multiple vulnerabilities in the driver. Broadcom wl Driver vulnerabilities : Client is an access point (AP) To do with 4-way During handshake EAPOL message 3 In the analysis process of 2 There are two heap buffer overflows. FullMAC When used in a chipset, these buffer overflows occur in the chipset firmware. Open source brcmfmac Vulnerability present in the driver : brcmfmac Driver is Broadcom FullMAC This driver works only with the chipset. Vulnerability to avoid frame verification - CVE-2019-9503 brcmfmac If the driver receives a firmware event frame from a remote source, is_wlc_event_frame This function is designed to discard this frame and call the appropriate handler when a firmware event frame is received from the host. However, the bus connecting the chipset USB in the case of ( For example Wi-Fi Dongle etc. ) , The frame verification process according to the above source may be bypassed and firmware event frames from remote sources may be processed. Heap buffer overflow - CVE-2019-9500 Wake-up on Wireless LAN If the feature is enabled, by processing a specially crafted event frame, brcmf_wowl_nd_results A heap buffer overflow may occur in the function. Also, the vulnerability of frame verification avoidance (CVE-2019-9503) By combining with, it can be exploited for remote attacks.Crafted Wi-Fi Denial of service by processing frames (DoS) It can cause a condition. In some situations, arbitrary code may be executed. Attackers may exploit these issues to execute arbitrary code within the context of the affected application. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations

Trust: 2.79

sources: NVD: CVE-2019-9501 // CERT/CC: VU#166939 // JVNDB: JVNDB-2019-002702 // BID: 108013 // VULHUB: VHN-160936 // VULMON: CVE-2019-9501

AFFECTED PRODUCTS

vendor:synologymodel:router managerscope:eqversion:1.2

Trust: 1.3

vendor:broadcommodel:bcm4339scope:eqversion: -

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:broadcommodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:brcmfmacmodel:driverscope: - version: -

Trust: 0.8

vendor:broadcommodel:w1 driverscope: - version: -

Trust: 0.8

vendor:broadcommodel:wifi driverscope:eqversion:0

Trust: 0.3

vendor:broadcommodel:bcm4352scope:eqversion:6.30.223.0

Trust: 0.3

vendor:broadcommodel:bcm43236scope:eqversion:6.37.14.105

Trust: 0.3

sources: CERT/CC: VU#166939 // BID: 108013 // JVNDB: JVNDB-2019-002702 // NVD: CVE-2019-9501

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9501
value: HIGH

Trust: 1.0

cret@cert.org: CVE-2019-9501
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201904-965
value: HIGH

Trust: 0.6

VULHUB: VHN-160936
value: HIGH

Trust: 0.1

VULMON: CVE-2019-9501
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-9501
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-160936
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-9501
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cret@cert.org: CVE-2019-9501
baseSeverity: HIGH
baseScore: 7.9
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-160936 // VULMON: CVE-2019-9501 // CNNVD: CNNVD-201904-965 // NVD: CVE-2019-9501 // NVD: CVE-2019-9501

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-122

Trust: 1.0

sources: VULHUB: VHN-160936 // NVD: CVE-2019-9501

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201904-965

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201904-965

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002702

PATCH

title:Connecting Everything url:https://www.broadcom.com/

Trust: 0.8

title:Broadcom WiFi Chipset Drivers Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91778

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2020/07/15/july_2020_patch_tuesday/

Trust: 0.2

title:Huawei Security Advisories: Security Advisory - Two Heap Buffer Overflow Vulnerabilities in Broadcom WiFi Chipset Driversurl:https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=a3f3540316426ad86e8026fbac500d9a

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/lnick2023/nicenice

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:PoC in GitHuburl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

title:PoC in GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2019-9501 // JVNDB: JVNDB-2019-002702 // CNNVD: CNNVD-201904-965

EXTERNAL IDS

db:CERT/CCid:VU#166939

Trust: 3.7

db:NVDid:CVE-2019-9501

Trust: 2.9

db:BIDid:108013

Trust: 1.0

db:JVNid:JVNVU90663693

Trust: 0.8

db:JVNDBid:JVNDB-2019-002702

Trust: 0.8

db:CNNVDid:CNNVD-201904-965

Trust: 0.7

db:AUSCERTid:ESB-2022.0610

Trust: 0.6

db:AUSCERTid:ESB-2020.2309

Trust: 0.6

db:AUSCERTid:ESB-2022.0614

Trust: 0.6

db:AUSCERTid:ESB-2022.0215

Trust: 0.6

db:VULHUBid:VHN-160936

Trust: 0.1

db:VULMONid:CVE-2019-9501

Trust: 0.1

sources: CERT/CC: VU#166939 // VULHUB: VHN-160936 // VULMON: CVE-2019-9501 // BID: 108013 // JVNDB: JVNDB-2019-002702 // CNNVD: CNNVD-201904-965 // NVD: CVE-2019-9501

REFERENCES

url:https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html

Trust: 3.7

url:https://kb.cert.org/vuls/id/166939/

Trust: 1.8

url:https://www.kb.cert.org/vuls/id/166939/

Trust: 1.7

url:http://www.linux.org/

Trust: 0.9

url:https://www.synology.com/en-global/security/advisory/synology_sa_19_18

Trust: 0.9

url:https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com

Trust: 0.8

url:https://broadcom.com/

Trust: 0.8

url:https://git.kernel.org/linus/a4176ec356c73a46c07c181c6d04039fafa34a9f

Trust: 0.8

url:https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff

Trust: 0.8

url:https://www.synology.com/security/advisory/synology_sa_19_18

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9500

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9501

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9502

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9503

Trust: 0.8

url:https://jvn.jp/vu/jvnvu90663693/

Trust: 0.8

url:https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com/

Trust: 0.8

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f

Trust: 0.8

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1b5e2423164b3670e8bc9174e4762d297990deff

Trust: 0.8

url:https://www.securityfocus.com/bid/108013

Trust: 0.7

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190017

Trust: 0.6

url:https://source.android.com/security/bulletin/2020-07-01

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-9501

Trust: 0.6

url:https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2020-32744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2309/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0614

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0215

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0610

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/166939

Trust: 0.1

sources: CERT/CC: VU#166939 // VULHUB: VHN-160936 // VULMON: CVE-2019-9501 // BID: 108013 // JVNDB: JVNDB-2019-002702 // CNNVD: CNNVD-201904-965 // NVD: CVE-2019-9501

CREDITS

Hugues Anguelkov

Trust: 0.9

sources: BID: 108013 // CNNVD: CNNVD-201904-965

SOURCES

db:CERT/CCid:VU#166939
db:VULHUBid:VHN-160936
db:VULMONid:CVE-2019-9501
db:BIDid:108013
db:JVNDBid:JVNDB-2019-002702
db:CNNVDid:CNNVD-201904-965
db:NVDid:CVE-2019-9501

LAST UPDATE DATE

2024-11-23T19:23:46.990000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#166939date:2019-04-23T00:00:00
db:VULHUBid:VHN-160936date:2020-02-10T00:00:00
db:VULMONid:CVE-2019-9501date:2020-02-10T00:00:00
db:BIDid:108013date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2019-002702date:2019-04-19T00:00:00
db:CNNVDid:CNNVD-201904-965date:2022-03-10T00:00:00
db:NVDid:CVE-2019-9501date:2024-11-21T04:51:44.607

SOURCES RELEASE DATE

db:CERT/CCid:VU#166939date:2019-04-17T00:00:00
db:VULHUBid:VHN-160936date:2020-02-03T00:00:00
db:VULMONid:CVE-2019-9501date:2020-02-03T00:00:00
db:BIDid:108013date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2019-002702date:2019-04-19T00:00:00
db:CNNVDid:CNNVD-201904-965date:2019-04-17T00:00:00
db:NVDid:CVE-2019-9501date:2020-02-03T21:15:11.487