Vulnerability Name:

CVE-2020-8899 (CCN-181553)

Assigned:2020-05-05
Published:2020-05-05
Updated:2022-10-07
Summary:There is a buffer overwrite vulnerability in the Quram qmg library of Samsung's Android OS versions O(8.x), P(9.0) and Q(10.0). An unauthenticated, unauthorized attacker sending a specially crafted MMS to a vulnerable phone can trigger a heap-based buffer overflow in the Quram image codec leading to an arbitrary remote code execution (RCE) without any user interaction. The Samsung ID is SVE-2020-16747.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.8 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2020-8899

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html

Source: CCN
Type: US-CERT VU#366027
Samsung Qmage codec for Android Skia library does not properly validate image files

Source: CCN
Type: Google Security Research Issue 2002
Samsung Android multiple interactionless RCEs and other remote access issues in Qmage image codec built into Skia

Source: CONFIRM
Type: Exploit, Issue Tracking, Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=2002

Source: XF
Type: UNKNOWN
samsung-cve20208899-bo(181553)

Source: CCN
Type: Packet Storm Security [05-08-2020]
Samsung Android Remote Code Execution

Source: CCN
Type: Samsung Mobile Web site
Android Security Updates

Source: CONFIRM
Type: Vendor Advisory
https://security.samsungmobile.com/securityUpdate.smsb

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#366027

Vulnerable Configuration:Configuration 1:
  • cpe:/o:google:android:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:10.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    google android 8.0
    google android 8.1
    google android 9.0
    google android 10.0