Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes. To exploit this vulnerability, an attacker must send an IRP with a system buffer size of 0.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://downwithup.github.io/CVEPosts.html | third party advisory |
https://www.realtek.cz/realtek-network-drivers.html | vendor advisory |