Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0.
References
Link | Resource |
---|---|
https://downwithup.github.io/CVEPosts.html | Third Party Advisory |
https://www.realtek.cz/realtek-network-drivers.html | Vendor Advisory |
https://downwithup.github.io/CVEPosts.html | Third Party Advisory |
https://www.realtek.cz/realtek-network-drivers.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://downwithup.github.io/CVEPosts.html - Third Party Advisory | |
References | () https://www.realtek.cz/realtek-network-drivers.html - Vendor Advisory |
Information
Published : 2020-02-12 18:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11867
Mitre link : CVE-2019-11867
CVE.ORG link : CVE-2019-11867
JSON object : View
Products Affected
realtek
- ndis
CWE
CWE-476
NULL Pointer Dereference