3 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. El controlador Broadcom wl WiFi es vulnerable a un desbordamiento del búfer de la pila. • https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html https://kb.cert.org/vuls/id/166939 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 1

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. El controlador Broadcom wl WiFi es vulnerable a un desbordamiento del búfer de la pila. • https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html https://kb.cert.org/vuls/id/166939 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 11%CPEs: 2EXPL: 1

Stack-based buffer overflow in the firmware in Broadcom Wi-Fi HardMAC SoC chips, when the firmware supports CCKM Fast and Secure Roaming and the feature is enabled in RAM, allows remote attackers to execute arbitrary code via a crafted reassociation response frame with a Cisco IE (156). Desbordamiento de búfer basado en pila en el firmware en Broadcom Wi-Fi HardMAC SoC chips, cuando el firmware soporta CCKM Fast y Secure Roaming y la funcionalidad está habilitada en RAM, permite a atacantes remotos ejecutar código arbitrario a través de marco de respuesta de reasociación manipulado con un Cisco IE (156). • http://packetstormsecurity.com/files/141803/Broadcom-Stack-Buffer-Overflow.html http://www.securityfocus.com/bid/97054 https://bugs.chromium.org/p/project-zero/issues/detail?id=1051 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •