ID CVE-2015-9222
Summary In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, and Snapdragon_High_Med_2016, processing erroneous bitstreams may result in a HW freeze. FW should detect the HW freeze based on watchdog timer, but because the watchdog timer is not enabled, an infinite loop occurs, resulting in a device freeze.
References
Vulnerable Configurations
  • cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 02-05-2018 - 12:58)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bid 103671
confirm https://source.android.com/security/bulletin/2018-04-01
exploit-db 39739
Last major update 02-05-2018 - 12:58
Published 18-04-2018 - 14:29
Last modified 02-05-2018 - 12:58
Back to Top