Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise
#1
Quote:A critical Linux bug has been discovered that could allow attackers to fully compromise vulnerable machines. A fix has been proposed but has not yet been incorporated into the Linux kernel.
 
The flaw (CVE-2019-17666), which was classified as critical in severity, exists in the “rtlwifi” driver, which is a software component used to allow certain Realtek Wi-Fi modules, used in Linux devices, to communicate with the Linux operating system.
 
Specifically, the driver is vulnerable to a buffer overflow attack, where a buffer (a region in physical memory storage used to temporarily store data while it is being moved) is allocated in the heap portion of memory (a region of process’s memory which is used to store dynamic variables). That excess data in turn corrupts nearby space in memory and could alter other data, opening the door for malicious attacks. This specific flaw could enable attackers to launch a variety of attacks – from crashing vulnerable Linux machines to full takeover.

Read more here: https://threatpost.com/critical-linux-wi...se/149325/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Messages In This Thread
Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise - by silversurfer - 19 October 19, 09:17

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Free Download Manager 6.33.1.6648
Changes in 6.33.1....harlan4096 — 08:33
Brave 1.87.190 (Chromium 145.0.7632.109)
Release v1.87.190 ...harlan4096 — 08:32
LibreOffice 25.8.5
Berlin, 19 Februar...harlan4096 — 08:30
Google Chrome 145.0.7632.109/110
Google Chrome 145....harlan4096 — 08:29
Internet Download Manager 6.32 Build 9
Internet Download ...Kool — 00:41

[-]
Birthdays
Today's Birthdays
avatar (38)Michaelaburi
avatar (46)dpascoal
Upcoming Birthdays
avatar (46)dimaWeami
avatar (44)Baihu

[-]
Online Staff
There are no staff members currently online.

>