ID

VAR-202002-0375


CVE

CVE-2019-9502


TITLE

Broadcom WiFi chipset drivers contain multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#166939

DESCRIPTION

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. Broadcom Made Wi-Fi For chipset Broadcom wl Drivers and open source brcmfmac There are multiple vulnerabilities in the driver. Broadcom wl Driver vulnerabilities : Client is an access point (AP) To do with 4-way During handshake EAPOL message 3 In the analysis process of 2 There are two heap buffer overflows. FullMAC When used in a chipset, these buffer overflows occur in the chipset firmware. Open source brcmfmac Vulnerability present in the driver : brcmfmac Driver is Broadcom FullMAC This driver works only with the chipset. Vulnerability to avoid frame verification - CVE-2019-9503 brcmfmac If the driver receives a firmware event frame from a remote source, is_wlc_event_frame This function is designed to discard this frame and call the appropriate handler when a firmware event frame is received from the host. However, the bus connecting the chipset USB in the case of ( For example Wi-Fi Dongle etc. ) , The frame verification process according to the above source may be bypassed and firmware event frames from remote sources may be processed. Heap buffer overflow - CVE-2019-9500 Wake-up on Wireless LAN If the feature is enabled, by processing a specially crafted event frame, brcmf_wowl_nd_results A heap buffer overflow may occur in the function. Also, the vulnerability of frame verification avoidance (CVE-2019-9503) By combining with, it can be exploited for remote attacks.Crafted Wi-Fi Denial of service by processing frames (DoS) It can cause a condition. In some situations, arbitrary code may be executed. Attackers may exploit these issues to execute arbitrary code within the context of the affected application. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations

Trust: 2.79

sources: NVD: CVE-2019-9502 // CERT/CC: VU#166939 // JVNDB: JVNDB-2019-002702 // BID: 108013 // VULHUB: VHN-160937 // VULMON: CVE-2019-9502

AFFECTED PRODUCTS

vendor:synologymodel:router managerscope:eqversion:1.2

Trust: 1.3

vendor:broadcommodel:bcm4339scope:eqversion: -

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:broadcommodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:brcmfmacmodel:driverscope: - version: -

Trust: 0.8

vendor:broadcommodel:w1 driverscope: - version: -

Trust: 0.8

vendor:broadcommodel:wifi driverscope:eqversion:0

Trust: 0.3

vendor:broadcommodel:bcm4352scope:eqversion:6.30.223.0

Trust: 0.3

vendor:broadcommodel:bcm43236scope:eqversion:6.37.14.105

Trust: 0.3

sources: CERT/CC: VU#166939 // BID: 108013 // JVNDB: JVNDB-2019-002702 // NVD: CVE-2019-9502

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9502
value: HIGH

Trust: 1.0

cret@cert.org: CVE-2019-9502
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201904-964
value: HIGH

Trust: 0.6

VULHUB: VHN-160937
value: HIGH

Trust: 0.1

VULMON: CVE-2019-9502
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-9502
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-160937
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-9502
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cret@cert.org: CVE-2019-9502
baseSeverity: HIGH
baseScore: 7.9
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-160937 // VULMON: CVE-2019-9502 // CNNVD: CNNVD-201904-964 // NVD: CVE-2019-9502 // NVD: CVE-2019-9502

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-122

Trust: 1.0

sources: VULHUB: VHN-160937 // NVD: CVE-2019-9502

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201904-964

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201904-964

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002702

PATCH

title:Connecting Everything url:https://www.broadcom.com/

Trust: 0.8

title:Broadcom WiFi Chipset Drivers Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91777

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2020/07/15/july_2020_patch_tuesday/

Trust: 0.2

title:Huawei Security Advisories: Security Advisory - Two Heap Buffer Overflow Vulnerabilities in Broadcom WiFi Chipset Driversurl:https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=a3f3540316426ad86e8026fbac500d9a

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/lnick2023/nicenice

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:PoC in GitHuburl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

title:PoC in GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2019-9502 // JVNDB: JVNDB-2019-002702 // CNNVD: CNNVD-201904-964

EXTERNAL IDS

db:CERT/CCid:VU#166939

Trust: 3.7

db:NVDid:CVE-2019-9502

Trust: 2.9

db:BIDid:108013

Trust: 1.0

db:JVNid:JVNVU90663693

Trust: 0.8

db:JVNDBid:JVNDB-2019-002702

Trust: 0.8

db:CNNVDid:CNNVD-201904-964

Trust: 0.7

db:AUSCERTid:ESB-2022.0610

Trust: 0.6

db:AUSCERTid:ESB-2020.2309

Trust: 0.6

db:AUSCERTid:ESB-2022.0614

Trust: 0.6

db:AUSCERTid:ESB-2022.0215

Trust: 0.6

db:VULHUBid:VHN-160937

Trust: 0.1

db:VULMONid:CVE-2019-9502

Trust: 0.1

sources: CERT/CC: VU#166939 // VULHUB: VHN-160937 // VULMON: CVE-2019-9502 // BID: 108013 // JVNDB: JVNDB-2019-002702 // CNNVD: CNNVD-201904-964 // NVD: CVE-2019-9502

REFERENCES

url:https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html

Trust: 3.7

url:https://kb.cert.org/vuls/id/166939/

Trust: 1.8

url:https://www.kb.cert.org/vuls/id/166939/

Trust: 1.7

url:http://www.linux.org/

Trust: 0.9

url:https://www.synology.com/en-global/security/advisory/synology_sa_19_18

Trust: 0.9

url:https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com

Trust: 0.8

url:https://broadcom.com/

Trust: 0.8

url:https://git.kernel.org/linus/a4176ec356c73a46c07c181c6d04039fafa34a9f

Trust: 0.8

url:https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff

Trust: 0.8

url:https://www.synology.com/security/advisory/synology_sa_19_18

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9500

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9501

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9502

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9503

Trust: 0.8

url:https://jvn.jp/vu/jvnvu90663693/

Trust: 0.8

url:https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com/

Trust: 0.8

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f

Trust: 0.8

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1b5e2423164b3670e8bc9174e4762d297990deff

Trust: 0.8

url:https://www.securityfocus.com/bid/108013

Trust: 0.7

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190017

Trust: 0.6

url:https://source.android.com/security/bulletin/2020-07-01

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-9502

Trust: 0.6

url:https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2020-32744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2309/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0614

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0215

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0610

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/166939

Trust: 0.1

sources: CERT/CC: VU#166939 // VULHUB: VHN-160937 // VULMON: CVE-2019-9502 // BID: 108013 // JVNDB: JVNDB-2019-002702 // CNNVD: CNNVD-201904-964 // NVD: CVE-2019-9502

CREDITS

Hugues Anguelkov

Trust: 0.9

sources: BID: 108013 // CNNVD: CNNVD-201904-964

SOURCES

db:CERT/CCid:VU#166939
db:VULHUBid:VHN-160937
db:VULMONid:CVE-2019-9502
db:BIDid:108013
db:JVNDBid:JVNDB-2019-002702
db:CNNVDid:CNNVD-201904-964
db:NVDid:CVE-2019-9502

LAST UPDATE DATE

2024-11-23T20:02:16.840000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#166939date:2019-04-23T00:00:00
db:VULHUBid:VHN-160937date:2020-02-10T00:00:00
db:VULMONid:CVE-2019-9502date:2020-02-10T00:00:00
db:BIDid:108013date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2019-002702date:2019-04-19T00:00:00
db:CNNVDid:CNNVD-201904-964date:2022-03-10T00:00:00
db:NVDid:CVE-2019-9502date:2024-11-21T04:51:44.727

SOURCES RELEASE DATE

db:CERT/CCid:VU#166939date:2019-04-17T00:00:00
db:VULHUBid:VHN-160937date:2020-02-03T00:00:00
db:VULMONid:CVE-2019-9502date:2020-02-03T00:00:00
db:BIDid:108013date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2019-002702date:2019-04-19T00:00:00
db:CNNVDid:CNNVD-201904-964date:2019-04-17T00:00:00
db:NVDid:CVE-2019-9502date:2020-02-03T21:15:11.547