Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-9502

Description

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

POC

Reference

- https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html

- https://kb.cert.org/vuls/id/166939/

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/ARPSyndicate/cvemon

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/lnick2023/nicenice

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/xbl3/awesome-cve-poc_qazbnm456