cve/2019/CVE-2019-14897.md
2025-09-29 21:09:30 +02:00

23 lines
1.1 KiB
Markdown

### [CVE-2019-14897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=version%20kernel-2.6.32%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121&color=brightgreen)
### Description
A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
### POC
#### Reference
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- https://usn.ubuntu.com/4225-2/
- https://usn.ubuntu.com/4227-1/
- https://usn.ubuntu.com/4228-1/
#### Github
- https://github.com/Live-Hack-CVE/CVE-2019-14897
- https://github.com/MrAgrippa/nes-01