cve/2019/CVE-2019-14897.md

20 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-14897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20version%20kernel-2.6.32%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121&color=brighgreen)
### Description
A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
### POC
#### Reference
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
#### Github
- https://github.com/Live-Hack-CVE/CVE-2019-14897
- https://github.com/MrAgrippa/nes-01