Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0.
References
Link | Resource |
---|---|
https://downwithup.github.io/CVEPosts.html | Third Party Advisory |
https://www.realtek.cz/realtek-network-drivers.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-02-12 18:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-11867
Mitre link : CVE-2019-11867
CVE.ORG link : CVE-2019-11867
JSON object : View
Products Affected
realtek
- ndis
CWE
CWE-476
NULL Pointer Dereference