Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing SET_PASSPOINT_LIST vendor command HDD does not make sure that the realm string that gets passed by upper-layer is NULL terminated. This may lead to buffer overflow as strlen is used to get realm string length to construct the PASSPOINT WMA command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- https://source.android.com/security/bulletin/pixel/2018-09-01#qualcomm-componentPatchVendor Advisory
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-auroPatchThird Party Advisory
- https://source.android.com/security/bulletin/pixel/2018-09-01#qualcomm-componentPatchVendor Advisory
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-auroPatchThird Party Advisory
FAQ
What is CVE-2018-11298?
CVE-2018-11298 is a vulnerability with a CVSS score of 7.8 (HIGH). In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing SET_PASSPOINT_LIST vendor command HDD does not make sure that the realm str...
How severe is CVE-2018-11298?
CVE-2018-11298 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11298?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.