cve/2019/CVE-2019-10484.md

19 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-10484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10484)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20After%20Free%20issue%20in%20Secure%20Processor%20NVM%20handler&color=brighgreen)
### Description
Use after free issue occurs when command destructors access dynamically allocated response buffer which is already deallocated during previous command teardwon sequence in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8098, MSM8909W, Nicobar, QCS405, QCS605, SDA845, SDM660, SDM670, SDM710, SDM845, SDX24, SM6150, SM7150, SM8150, SM8250, SXR2130
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin
2024-06-09 00:33:16 +00:00
- https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.