{"id":"CVE-2019-9500","details":"The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.","modified":"2026-03-10T22:52:27.809970Z","published":"2020-01-16T21:15:12.007Z","related":["SUSE-SU-2019:1240-1","SUSE-SU-2019:1241-1","SUSE-SU-2019:1242-1","SUSE-SU-2019:1244-1","SUSE-SU-2019:1550-1","SUSE-SU-2019:2430-1","openSUSE-SU-2019:1404-1","openSUSE-SU-2019:1479-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB"},{"type":"ADVISORY","url":"https://kb.cert.org/vuls/id/166939/"},{"type":"FIX","url":"https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff"},{"type":"EVIDENCE","url":"https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9500.json","unresolved_ranges":[{"events":[{"introduced":"4.5"},{"fixed":"4.9.181"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.123"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.47"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.0.20"}]}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}