CVE-2019-2053
Published: 8 May 2019
In wnm_parse_neighbor_report_elem of wnm_sta.c, there is a possible out-of-bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-122074159
Notes
Author | Note |
---|---|
mdeslaur | per upstream: The actual read bytes would be stored locally, but they were not used for anything, so other than reading beyond the end of an allocated heap memory buffer, this did not result in any behavior difference or exposure of the bytes. |
Priority
Status
Package | Release | Status |
---|---|---|
wpa Launchpad, Ubuntu, Debian |
cosmic |
Ignored
(end of life)
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
xenial |
Needed
|
|
focal |
Not vulnerable
(2.9-1ubuntu4)
|
|
hirsute |
Not vulnerable
(2.9-1ubuntu4)
|
|
jammy |
Not vulnerable
(2.9-1ubuntu4)
|
|
kinetic |
Not vulnerable
(2.9-1ubuntu4)
|
|
lunar |
Not vulnerable
(2.9-1ubuntu4)
|
|
bionic |
Needed
|
|
groovy |
Not vulnerable
(2.9-1ubuntu4)
|
|
impish |
Not vulnerable
(2.9-1ubuntu4)
|
|
upstream |
Needs triage
|
|
mantic |
Not vulnerable
(2.9-1ubuntu4)
|
|
Patches: upstream: https://w1.fi/cgit/hostap/commit/?id=e8ebef87cb4bb57a9d4b1ca3bc1ee2979ff8c297 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |