Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, in multiple Secure DEMUX functions (e.g., SDMX_open_session, SDMX_close_session, SDMX_set_session_cfg), when parameter validation fails, an error code is written into a response buffer, without checking that response buffer length (rsplen) passed from HLOS is large enough to hold the response. If the buffer is at the end of a non-secure page followed by secured memory page, this can cause a secure memory corruption.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Android Qualcomm闭源组件缓冲区错误漏洞
Vulnerability Description
Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。Qualcomm MDM9206等都是美国高通(Qualcomm)公司应用于不同平台的中央处理器(CPU)产品。 Android 2018-04-05之前版本中的Qualcomm闭源组件存在缓冲区错误漏洞,该漏洞源于在参数验证失败之后,程序直接将错误代码写入到响应缓冲区,而没有验证该缓冲区是否能容下该响应。远程攻击者可利用该漏洞损坏安全内存。以下产品(用于汽车、移动设备和手表)受到影
CVSS Information
N/A
Vulnerability Type
N/A