Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow in WMA handler.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/107770Third Party AdvisoryVDB Entry
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-auroPatchThird Party Advisory
- http://www.securityfocus.com/bid/107770Third Party AdvisoryVDB Entry
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-auroPatchThird Party Advisory
FAQ
What is CVE-2018-11869?
CVE-2018-11869 is a vulnerability with a CVSS score of 7.8 (HIGH). In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow...
How severe is CVE-2018-11869?
CVE-2018-11869 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11869?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.