Vulnerability CVE-2019-2263


Published: 2019-07-25

Description:
Access to freed memory can happen while reading from diag driver due to use after free issue in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA9531, QCA9980, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDM660, SDX20, Snapdragon_High_Med_2016

Type:

CWE-416

(Use After Free)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.4/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Qualcomm -> Sd 430 firmware 
Qualcomm -> Sdx20 firmware 
Qualcomm -> Sd 435 firmware 
Qualcomm -> Snapdragon high med 2016 firmware 
Qualcomm -> Ipq4019 firmware 
Qualcomm -> Sd 450 firmware 
Qualcomm -> Ipq8064 firmware 
Qualcomm -> Sd 625 firmware 
Qualcomm -> Mdm9206 firmware 
Qualcomm -> Sd 636 firmware 
Qualcomm -> Mdm9607 firmware 
Qualcomm -> Sd 650 firmware 
Qualcomm -> Mdm9640 firmware 
Qualcomm -> Sd 652 firmware 
Qualcomm -> Mdm9650 firmware 
Qualcomm -> Sd 670 firmware 
Qualcomm -> Msm8909w firmware 
Qualcomm -> Sd 710 firmware 
Qualcomm -> Msm8996au firmware 
Qualcomm -> Sd 712 firmware 
Qualcomm -> Qca9531 firmware 
Qualcomm -> Sd 820 firmware 
Qualcomm -> Qca9980 firmware 
Qualcomm -> Sd 820a firmware 
Qualcomm -> Sd 205 firmware 
Qualcomm -> Sd 835 firmware 
Qualcomm -> Sd 210 firmware 
Qualcomm -> Sd 845 firmware 
Qualcomm -> Sd 212 firmware 
Qualcomm -> Sd 850 firmware 
Qualcomm -> Sd 425 firmware 
Qualcomm -> Sdm660 firmware 
Qualcomm -> Sd 427 firmware 

 References:
https://www.codeaurora.org/security-bulletin/2019/07/01/july-2019-code-aurora-security-bulletin

Copyright 2024, cxsecurity.com

 

Back to Top