Vulnerability identifier: #VU36634
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-129
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Google Android
Operating systems & Components /
Operating system
Vendor: Google
Description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on the length of array while accessing can lead to an out of bound read in WLAN HOST function.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Google Android:
External links
http://www.securityfocus.com/bid/107770
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=2fc3e8a2ae8233690872d313fbfb4c74d0c61daa
http://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.