ID CVE-2019-10612
Summary UTCB object has a function pointer called by the reaper to deallocate its memory resources and this address can potentially be corrupted by stack overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, MDM9650, QCS605, SA6155P, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
References
Vulnerable Configurations
  • cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 09-03-2020 - 11:56)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
confirm https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin
Last major update 09-03-2020 - 11:56
Published 05-03-2020 - 09:15
Last modified 09-03-2020 - 11:56
Back to Top