Vulnerability Name:

CVE-2018-11924 (CCN-163266)

Assigned:2018-06-07
Published:2019-04-01
Updated:2019-05-28
Summary:Improper buffer length validation in WLAN function can lead to a potential integer oveflow issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2018-11924

Source: XF
Type: UNKNOWN
qualcomm-cve201811924-integer-overflow(163266)

Source: CCN
Type: Code Aurora Security Bulletin April 2019
Code Aurora

Source: CONFIRM
Type: Patch, Third Party Advisory
https://www.codeaurora.org/security-bulletin/2019/04/01/april-2019-code-aurora-security-bulletin

Vulnerable Configuration:Configuration 1:
  • cpe:/o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:mdm9150:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:mdm9206:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:mdm9607:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:mdm9640:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:mdm9650:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6174a:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6574au:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca9377:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca9379:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qcs605:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_210:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_212:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_205:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_425:-:*:*:*:*:*:*:*

  • Configuration 16:
  • cpe:/o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_427:-:*:*:*:*:*:*:*

  • Configuration 17:
  • cpe:/o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_430:-:*:*:*:*:*:*:*

  • Configuration 18:
  • cpe:/o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_435:-:*:*:*:*:*:*:*

  • Configuration 19:
  • cpe:/o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_450:-:*:*:*:*:*:*:*

  • Configuration 20:
  • cpe:/o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_625:-:*:*:*:*:*:*:*

  • Configuration 21:
  • cpe:/o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_636:-:*:*:*:*:*:*:*

  • Configuration 22:
  • cpe:/o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_675:-:*:*:*:*:*:*:*

  • Configuration 23:
  • cpe:/o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_712:-:*:*:*:*:*:*:*

  • Configuration 24:
  • cpe:/o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_710:-:*:*:*:*:*:*:*

  • Configuration 25:
  • cpe:/o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_670:-:*:*:*:*:*:*:*

  • Configuration 26:
  • cpe:/o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_820a:-:*:*:*:*:*:*:*

  • Configuration 27:
  • cpe:/o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_835:-:*:*:*:*:*:*:*

  • Configuration 28:
  • cpe:/o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_845:-:*:*:*:*:*:*:*

  • Configuration 29:
  • cpe:/o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_850:-:*:*:*:*:*:*:*

  • Configuration 30:
  • cpe:/o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_855:-:*:*:*:*:*:*:*

  • Configuration 31:
  • cpe:/o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sda660:-:*:*:*:*:*:*:*

  • Configuration 32:
  • cpe:/o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm630:-:*:*:*:*:*:*:*

  • Configuration 33:
  • cpe:/o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm660:-:*:*:*:*:*:*:*

  • Configuration 34:
  • cpe:/o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdx20:-:*:*:*:*:*:*:*

  • Configuration 35:
  • cpe:/o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdx24:-:*:*:*:*:*:*:*

  • Configuration 36:
  • cpe:/o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sm7150:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    qualcomm mdm9150 firmware -
    qualcomm mdm9150 -
    qualcomm mdm9206 firmware -
    qualcomm mdm9206 -
    qualcomm mdm9607 firmware -
    qualcomm mdm9607 -
    qualcomm mdm9640 firmware -
    qualcomm mdm9640 -
    qualcomm mdm9650 firmware -
    qualcomm mdm9650 -
    qualcomm msm8996au firmware -
    qualcomm msm8996au -
    qualcomm qca6174a firmware -
    qualcomm qca6174a -
    qualcomm qca6574au firmware -
    qualcomm qca6574au -
    qualcomm qca9377 firmware -
    qualcomm qca9377 -
    qualcomm qca9379 firmware -
    qualcomm qca9379 -
    qualcomm qcs605 firmware -
    qualcomm qcs605 -
    qualcomm sd 210 firmware -
    qualcomm sd 210 -
    qualcomm sd 212 firmware -
    qualcomm sd 212 -
    qualcomm sd 205 firmware -
    qualcomm sd 205 -
    qualcomm sd 425 firmware -
    qualcomm sd 425 -
    qualcomm sd 427 firmware -
    qualcomm sd 427 -
    qualcomm sd 430 firmware -
    qualcomm sd 430 -
    qualcomm sd 435 firmware -
    qualcomm sd 435 -
    qualcomm sd 450 firmware -
    qualcomm sd 450 -
    qualcomm sd 625 firmware -
    qualcomm sd 625 -
    qualcomm sd 636 firmware -
    qualcomm sd 636 -
    qualcomm sd 675 firmware -
    qualcomm sd 675 -
    qualcomm sd 712 firmware -
    qualcomm sd 712 -
    qualcomm sd 710 firmware -
    qualcomm sd 710 -
    qualcomm sd 670 firmware -
    qualcomm sd 670 -
    qualcomm sd 820a firmware -
    qualcomm sd 820a -
    qualcomm sd 835 firmware -
    qualcomm sd 835 -
    qualcomm sd 845 firmware -
    qualcomm sd 845 -
    qualcomm sd 850 firmware -
    qualcomm sd 850 -
    qualcomm sd 855 firmware -
    qualcomm sd 855 -
    qualcomm sda660 firmware -
    qualcomm sda660 -
    qualcomm sdm630 firmware -
    qualcomm sdm630 -
    qualcomm sdm660 firmware -
    qualcomm sdm660 -
    qualcomm sdx20 firmware -
    qualcomm sdx20 -
    qualcomm sdx24 firmware -
    qualcomm sdx24 -
    qualcomm sm7150 firmware -
    qualcomm sm7150 -
    qualcomm snapdragon mobile -
    qualcomm snapdragon auto -
    qualcomm snapdragon compute -
    qualcomm snapdragon voice & music -