Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0.
References
Link | Resource |
---|---|
https://www.realtek.cz/realtek-network-drivers.html | Vendor Advisory |
https://downwithup.github.io/CVEPosts.html | Third Party Advisory |
Configurations
Information
Published : 2020-02-12 10:15
Updated : 2020-02-25 05:43
NVD link : CVE-2019-11867
Mitre link : CVE-2019-11867
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
realtek
- ndis