Bug 1166118 - (CVE-2019-9501) VUL-0: CVE-2019-9501: broadcom-wl: heap buffer overflow in wlc_wpa_sup_eapol of the Broadcom wl WiFi driver
(CVE-2019-9501)
VUL-0: CVE-2019-9501: broadcom-wl: heap buffer overflow in wlc_wpa_sup_eapol ...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Security Team bot
Security Team bot
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-03-09 17:17 UTC by Wolfgang Frisch
Modified: 2020-03-09 17:17 UTC (History)
0 users

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-03-09 17:17:23 UTC
CVE-2019-9501

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By
supplying a vendor information element with a data length larger than 32 bytes,
a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case
scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated
attacker may be able to execute arbitrary code on a vulnerable system. More
typically, this vulnerability will result in denial-of-service conditions.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9501
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Comment 1 Wolfgang Frisch 2020-03-09 17:17:57 UTC
SUSE does not ship the broadcom-wl driver.