var-202002-0375
Vulnerability from variot

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. Broadcom Made Wi-Fi For chipset Broadcom wl Drivers and open source brcmfmac There are multiple vulnerabilities in the driver. Broadcom wl Driver vulnerabilities : Client is an access point (AP) To do with 4-way During handshake EAPOL message 3 In the analysis process of 2 There are two heap buffer overflows. FullMAC When used in a chipset, these buffer overflows occur in the chipset firmware. Open source brcmfmac Vulnerability present in the driver : brcmfmac Driver is Broadcom FullMAC This driver works only with the chipset. Vulnerability to avoid frame verification - CVE-2019-9503 brcmfmac If the driver receives a firmware event frame from a remote source, is_wlc_event_frame This function is designed to discard this frame and call the appropriate handler when a firmware event frame is received from the host. However, the bus connecting the chipset USB in the case of ( For example Wi-Fi Dongle etc. ) , The frame verification process according to the above source may be bypassed and firmware event frames from remote sources may be processed. Heap buffer overflow - CVE-2019-9500 Wake-up on Wireless LAN If the feature is enabled, by processing a specially crafted event frame, brcmf_wowl_nd_results A heap buffer overflow may occur in the function. Also, the vulnerability of frame verification avoidance (CVE-2019-9503) By combining with, it can be exploited for remote attacks.Crafted Wi-Fi Denial of service by processing frames (DoS) It can cause a condition. In some situations, arbitrary code may be executed. Attackers may exploit these issues to execute arbitrary code within the context of the affected application. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0375",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "router manager",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "synology",
        "version": "1.2"
      },
      {
        "model": "bcm4339",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": "driver",
        "scope": null,
        "trust": 0.8,
        "vendor": "brcmfmac",
        "version": null
      },
      {
        "model": "w1 driver",
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "wifi driver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "broadcom",
        "version": "0"
      },
      {
        "model": "bcm4352",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "broadcom",
        "version": "6.30.223.0"
      },
      {
        "model": "bcm43236",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "broadcom",
        "version": "6.37.14.105"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "db": "BID",
        "id": "108013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:broadcom:bcm4339_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:broadcom:bcm4339:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hugues Anguelkov",
    "sources": [
      {
        "db": "BID",
        "id": "108013"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2019-9502",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "VHN-160937",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2019-9502",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "author": "cret@cert.org",
            "availabilityImpact": "HIGH",
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.2,
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2019-9502",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "cret@cert.org",
            "id": "CVE-2019-9502",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201904-964",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-160937",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-9502",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. Broadcom Made Wi-Fi For chipset Broadcom wl Drivers and open source brcmfmac There are multiple vulnerabilities in the driver. Broadcom wl Driver vulnerabilities : Client is an access point (AP) To do with 4-way During handshake EAPOL message 3 In the analysis process of 2 There are two heap buffer overflows. FullMAC When used in a chipset, these buffer overflows occur in the chipset firmware. Open source brcmfmac Vulnerability present in the driver : brcmfmac Driver is Broadcom FullMAC This driver works only with the chipset. Vulnerability to avoid frame verification - CVE-2019-9503 brcmfmac If the driver receives a firmware event frame from a remote source, is_wlc_event_frame This function is designed to discard this frame and call the appropriate handler when a firmware event frame is received from the host. However, the bus connecting the chipset USB in the case of ( For example Wi-Fi Dongle etc. ) , The frame verification process according to the above source may be bypassed and firmware event frames from remote sources may be processed. Heap buffer overflow - CVE-2019-9500 Wake-up on Wireless LAN If the feature is enabled, by processing a specially crafted event frame, brcmf_wowl_nd_results A heap buffer overflow may occur in the function. Also, the vulnerability of frame verification avoidance (CVE-2019-9503) By combining with, it can be exploited for remote attacks.Crafted Wi-Fi Denial of service by processing frames (DoS) It can cause a condition. In some situations, arbitrary code may be executed. \nAttackers may exploit these issues to execute arbitrary code within the  context of the affected application. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "db": "BID",
        "id": "108013"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9502"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#166939",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "108013",
        "trust": 1.0
      },
      {
        "db": "JVN",
        "id": "JVNVU90663693",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0610",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.2309",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0614",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0215",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-160937",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9502",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "db": "BID",
        "id": "108013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "id": "VAR-202002-0375",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-26T22:39:51.191000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Connecting Everything ",
        "trust": 0.8,
        "url": "https://www.broadcom.com/"
      },
      {
        "title": "Broadcom WiFi Chipset Drivers Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91777"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2020/07/15/july_2020_patch_tuesday/"
      },
      {
        "title": "Huawei Security Advisories: Security Advisory - Two Heap Buffer Overflow Vulnerabilities in Broadcom WiFi Chipset Drivers",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=a3f3540316426ad86e8026fbac500d9a"
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/lnick2023/nicenice "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 "
      },
      {
        "title": "PoC in GitHub",
        "trust": 0.1,
        "url": "https://github.com/0xt11/cve-poc "
      },
      {
        "title": "PoC in GitHub",
        "trust": 0.1,
        "url": "https://github.com/developer3000s/poc-in-github "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/qazbnm456/awesome-cve-poc "
      },
      {
        "title": "PoC in GitHub",
        "trust": 0.1,
        "url": "https://github.com/hectorgie/poc-in-github "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html"
      },
      {
        "trust": 1.8,
        "url": "https://kb.cert.org/vuls/id/166939/"
      },
      {
        "trust": 1.7,
        "url": "https://www.kb.cert.org/vuls/id/166939/"
      },
      {
        "trust": 0.9,
        "url": "http://www.linux.org/"
      },
      {
        "trust": 0.9,
        "url": "https://www.synology.com/en-global/security/advisory/synology_sa_19_18"
      },
      {
        "trust": 0.8,
        "url": "https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com"
      },
      {
        "trust": 0.8,
        "url": "https://broadcom.com/"
      },
      {
        "trust": 0.8,
        "url": "https://git.kernel.org/linus/a4176ec356c73a46c07c181c6d04039fafa34a9f"
      },
      {
        "trust": 0.8,
        "url": "https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff"
      },
      {
        "trust": 0.8,
        "url": "https://www.synology.com/security/advisory/synology_sa_19_18"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9500"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9501"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9502"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9503"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90663693/"
      },
      {
        "trust": 0.8,
        "url": "https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com/"
      },
      {
        "trust": 0.8,
        "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f"
      },
      {
        "trust": 0.8,
        "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1b5e2423164b3670e8bc9174e4762d297990deff"
      },
      {
        "trust": 0.7,
        "url": "https://www.securityfocus.com/bid/108013"
      },
      {
        "trust": 0.6,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190017"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2020-07-01"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9502"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2020-32744"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.2309/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0614"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0215"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0610"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.kb.cert.org/vuls/id/166939"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "db": "BID",
        "id": "108013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "db": "BID",
        "id": "108013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-17T00:00:00",
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "date": "2020-02-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "date": "2020-02-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "date": "2019-04-17T00:00:00",
        "db": "BID",
        "id": "108013"
      },
      {
        "date": "2019-04-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "date": "2020-02-03T21:15:11.547000",
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "date": "2019-04-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#166939"
      },
      {
        "date": "2020-02-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-160937"
      },
      {
        "date": "2020-02-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-9502"
      },
      {
        "date": "2019-04-17T00:00:00",
        "db": "BID",
        "id": "108013"
      },
      {
        "date": "2019-04-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-002702"
      },
      {
        "date": "2020-02-10T14:31:55.877000",
        "db": "NVD",
        "id": "CVE-2019-9502"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Broadcom WiFi chipset drivers contain multiple vulnerabilities",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#166939"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-964"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.