Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0.
References
Link | Resource |
---|---|
https://downwithup.github.io/CVEPosts.html | Third Party Advisory |
https://www.realtek.cz/realtek-network-drivers.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-12T17:25:20
Updated: 2020-02-12T17:25:20
Reserved: 2019-05-09T00:00:00
Link: CVE-2019-11867
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-12T18:15:10.283
Modified: 2020-02-25T13:43:03.037
Link: CVE-2019-11867
JSON object: View
Redhat Information
No data.
CWE