cve/2017/CVE-2017-14883.md

18 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-14883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14883)
![](https://img.shields.io/static/v1?label=Product&message=Android%20for%20MSM%2C%20Firefox%20OS%20for%20MSM%2C%20QRD%20Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20Overflow%20to%20Buffer%20Overflow%20in%20WLAN&color=brighgreen)
### Description
In the function wma_unified_power_debug_stats_event_handler() in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-10-18, if the value param_buf->num_debug_register received from the FW command buffer is close to max of uint32, then the computation performed using this variable to calculate stats_registers_len may overflow to a smaller value leading to less than required memory allocated for power_stats_results and potentially a buffer overflow while copying the FW buffer to local buffer.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jiayy/android_vuln_poc-exp