Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for cmpl_params->num_reports, param_buf->desc_ids and param_buf->status in wma_mgmt_tx_bundle_completion_handler(), which is received from firmware, leads to potential out of bounds memory read.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- https://source.android.com/security/bulletin/pixel/2018-03-01Vendor Advisory
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://source.android.com/security/bulletin/pixel/2018-03-01Vendor Advisory
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
FAQ
What is CVE-2017-18052?
CVE-2017-18052 is a vulnerability with a CVSS score of 7.5 (HIGH). In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for cmpl_params->num_reports, param_buf->desc_ids and param_bu...
How severe is CVE-2017-18052?
CVE-2017-18052 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-18052?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.