← Back to CVEs
CVE-2019-17133
CRITICAL9.8
Description
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/4/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernelopensuse:leap
Weaknesses (CWE)
CWE-120
References
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0174(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0374(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0375(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0543(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0592(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0609(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0653(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0661(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0664(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0790(cve@mitre.org)
https://marc.info/?l=linux-wireless&m=157018270915487&w=2(cve@mitre.org)
https://seclists.org/bugtraq/2019/Nov/11(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20191031-0005/(cve@mitre.org)
https://usn.ubuntu.com/4208-1/(cve@mitre.org)
https://usn.ubuntu.com/4210-1/(cve@mitre.org)
https://usn.ubuntu.com/4211-1/(cve@mitre.org)
https://usn.ubuntu.com/4211-2/(cve@mitre.org)
https://usn.ubuntu.com/4226-1/(cve@mitre.org)
https://www.oracle.com/security-alerts/cpuApr2021.html(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0174(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0374(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0375(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0543(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0592(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0609(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0653(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0661(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0664(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0790(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
https://marc.info/?l=linux-wireless&m=157018270915487&w=2(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Nov/11(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4208-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4210-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4211-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4211-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4226-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuApr2021.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.