cve/2024/CVE-2024-45559.md
2025-09-29 21:09:30 +02:00

40 lines
2.5 KiB
Markdown

### [CVE-2024-45559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45559)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=QAM8255P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QAM8295P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QAM8620P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QAM8650P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QAM8775P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QAMSRV1H%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QAMSRV1M%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QCA6595%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QCA6595AU%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=QCA6696%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA7255P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA7775P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8255P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8295P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8540P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8620P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8650P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8770P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA8775P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SA9000P%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SRV1H%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SRV1L%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SRV1M%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-126%20Buffer%20Over-read&color=brightgreen)
### Description
Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds