Description
In wma_ndp_end_response_event_handler(), the variable len_end_rsp is a uint32 which can be overflowed if the value of variable "event->num_ndp_end_rsp_per_ndi_list" is very large which can then lead to a heap overwrite of the heap object end_rsp in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-9209 | In wma_ndp_end_response_event_handler(), the variable len_end_rsp is a uint32 which can be overflowed if the value of variable "event->num_ndp_end_rsp_per_ndi_list" is very large which can then lead to a heap overwrite of the heap object end_rsp in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel. |
References
History
No history.
Status: PUBLISHED
Assigner: qualcomm
Published:
Updated: 2024-09-17T01:42:07.517Z
Reserved: 2018-01-22T00:00:00.000Z
Link: CVE-2017-18070
No data.
Status : Modified
Published: 2018-06-12T20:29:00.407
Modified: 2024-11-21T03:19:17.633
Link: CVE-2017-18070
No data.
OpenCVE Enrichment
No data.
EUVD