Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:realtek:ndis:10.1.505.2015:*:*:*:*:*:*:*", "matchCriteriaId": "D128422E-6777-4CC5-88C8-C021777FE29C", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0."}, {"lang": "es", "value": "El controlador rt640x64.sys de Realtek NDIS, versi\u00f3n de archivo 10.1.505.2015, no lleva a cabo ninguna comprobaci\u00f3n de tama\u00f1o en un b\u00fafer de entrada desde el espacio del usuario, que el controlador asume que tiene un tama\u00f1o mayor que cero bytes. Para explotar esta vulnerabilidad, un atacante debe enviar un IRP con un tama\u00f1o de b\u00fafer del sistema de 0."}], "id": "CVE-2019-11867", "lastModified": "2024-11-21T04:21:55.200", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-02-12T18:15:10.283", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://downwithup.github.io/CVEPosts.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.realtek.cz/realtek-network-drivers.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://downwithup.github.io/CVEPosts.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.realtek.cz/realtek-network-drivers.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-476"}], "source": "nvd@nist.gov", "type": "Primary"}]}