Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9625, MDM9635M, SD 400, and SD 800, while computing the length of memory allocated for a Diag event, if the buffer length is very small or greater than the maximum, an integer overflow may occur, which later results in a buffer overflow.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-9003 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9625, MDM9635M, SD 400, and SD 800, while computing the length of memory allocated for a Diag event, if the buffer length is very small or greater than the maximum, an integer overflow may occur, which later results in a buffer overflow. |
References
History
No history.
Status: PUBLISHED
Assigner: qualcomm
Published:
Updated: 2024-09-17T01:56:43.963Z
Reserved: 2017-08-16T00:00:00.000Z
Link: CVE-2015-9150
No data.
Status : Modified
Published: 2018-04-18T14:29:05.167
Modified: 2024-11-21T02:39:54.723
Link: CVE-2015-9150
No data.
OpenCVE Enrichment
No data.
EUVD