漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Realtek rtl81xx SDK Wi-Fi Driver rtwlanu Heap-based Buffer Overflow Local Privilege Escalation Vulnerability
Vulnerability Description
Realtek rtl81xx SDK Wi-Fi Driver rtwlanu Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Realtek rtl81xx SDK Wi-Fi driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the N6CSet_DOT11_CIPHER_DEFAULT_KEY function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26553.
CVSS Information
N/A
Vulnerability Type
堆缓冲区溢出
Vulnerability Title
Realtek rtl81xx SDK Wi-Fi Driver 安全漏洞
Vulnerability Description
Realtek rtl81xx SDK Wi-Fi Driver是中国瑞昱半导体(Realtek)公司的一款网卡驱动软件。 Realtek rtl81xx SDK Wi-Fi Driver存在安全漏洞,该漏洞源于N6CSet_DOT11_CIPHER_DEFAULT_KEY函数验证不足,可能导致本地权限提升。
CVSS Information
N/A
Vulnerability Type
N/A