#VU50405 Stack-based buffer overflow in Realtek products - CVE-2020-9395
Published: July 7, 2020 / Updated: February 8, 2021
RTL8195AM
RTL8711AM
RTL8711AF
RTL8710AF
Realtek
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a malformed EAPOL-Key packet with a long keydata buffer. A remote authenticated attacker on the local network can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://github.com/ambiot/amb1_arduino/commit/dcea55cf9775a0166805b3db845b237ecd5e74ea#diff-d06e7a87f34cc464a56799a419033014
- https://github.com/ambiot/amb1_sdk/commit/bc5173d5d4faf6829074b0f1e1b242c12b7777a3#diff-700c216fb376666eaeda0c892e8bdc09
- https://www.amebaiot.com/en/security_bulletin/
- https://www.vdoo.com/blog/realtek-rtl8195a-vulnerabilities-discovered