Vulnerability Description
While processing fragments, when the fragment count becomes very large, an integer overflow leading to a buffer overflow can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
Related Weaknesses (CWE)
References
- https://source.android.com/security/bulletin/pixel/2018-06-01#qualcomm-componentVendor Advisory
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-sePatchThird Party Advisory
- https://source.android.com/security/bulletin/pixel/2018-06-01#qualcomm-componentVendor Advisory
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcaclPatchThird Party Advisory
- https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-sePatchThird Party Advisory
FAQ
What is CVE-2018-3577?
CVE-2018-3577 is a vulnerability with a CVSS score of 7.5 (HIGH). While processing fragments, when the fragment count becomes very large, an integer overflow leading to a buffer overflow can occur in Android releases from CAF using the linux kernel (Android for MSM,...
How severe is CVE-2018-3577?
CVE-2018-3577 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3577?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.