ID CVE-2018-11948
Summary Exceeding the limit of usage entries are not tracked and the information will be lost causing the content to lose continuity in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in versions MSM8996AU, QCS605, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130.
References
Vulnerable Configurations
  • cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 27-02-2019 - 20:00)
Impact:
Exploitability:
CWE CWE-129
CAPEC
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE COMPLETE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:C/A:N
refmap via4
bid 106845
confirm https://www.qualcomm.com/company/product-security/bulletins
Last major update 27-02-2019 - 20:00
Published 25-02-2019 - 22:29
Last modified 27-02-2019 - 20:00
Back to Top