ID |
CVE-2018-11891
|
Summary |
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on the length of array while accessing can lead to an out of bound read in WLAN HOST function. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 8.3 (as of 18-04-2019 - 13:00) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-129 |
CAPEC |
-
Overflow Buffers
Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
|
Access |
Vector | Complexity | Authentication |
ADJACENT_NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:A/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
|
Last major update |
18-04-2019 - 13:00 |
Published |
19-09-2018 - 14:29 |
Last modified |
18-04-2019 - 13:00 |