Vulnerability CVE-2018-11936


Published: 2019-05-24

Description:
Index of array is processed in a wrong way inside a while loop and result in invalid index (-1 or something else) leads to out of bound memory access. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9379, QCA9886, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820, SD 820A, SD 835, SDX20, SDX24, Snapdragon_High_Med_2016

Type:

CWE-400

(Uncontrolled Resource Consumption ('Resource Exhaustion'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Qualcomm -> Mdm9206 firmware 
Qualcomm -> Sd 425 firmware 
Qualcomm -> Mdm9607 firmware 
Qualcomm -> Sd 427 firmware 
Qualcomm -> Mdm9640 firmware 
Qualcomm -> Sd 430 firmware 
Qualcomm -> Mdm9650 firmware 
Qualcomm -> Sd 435 firmware 
Qualcomm -> Msm8996au firmware 
Qualcomm -> Sd 450 firmware 
Qualcomm -> Qca6174a firmware 
Qualcomm -> Sd 625 firmware 
Qualcomm -> Qca6574 firmware 
Qualcomm -> Sd 820 firmware 
Qualcomm -> Qca6574au firmware 
Qualcomm -> Sd 820a firmware 
Qualcomm -> Qca6584 firmware 
Qualcomm -> Sd 835 firmware 
Qualcomm -> Qca6584au firmware 
Qualcomm -> Sdx20 firmware 
Qualcomm -> Qca9377 firmware 
Qualcomm -> Sdx24 firmware 
Qualcomm -> Qca9379 firmware 
Qualcomm -> Snapdragon high med 2016 firmware 
Qualcomm -> Qca9886 firmware 
Qualcomm -> Sd 205 firmware 
Qualcomm -> Sd 210 firmware 
Qualcomm -> Sd 212 firmware 

 References:
https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11936

Copyright 2020, cxsecurity.com

 

Back to Top