ID |
CVE-2018-11883
|
Summary |
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, in policy mgr unit test if mode parameter in wlan function is given an out of bound value it can cause an out of bound access while accessing the PCL table. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 7.2 (as of 09-11-2018 - 17:30) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-129 |
CAPEC |
-
Overflow Buffers
Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
|
Last major update |
09-11-2018 - 17:30 |
Published |
19-09-2018 - 14:29 |
Last modified |
09-11-2018 - 17:30 |