mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
62 lines
3.3 KiB
JSON
62 lines
3.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@qualcomm.com",
|
|
"ID": "CVE-2020-11183",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8096AU, AR8151, MDM9206, MDM9250, MDM9650, MDM9655, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, PM215, PM439, PM660, PM660A, PM660L, PM8004, PM8005, PM855A, PM8909, PM8916, PM8937, PM8940, PM8953, PM8996, PM8998, PMD9607, PMD9655, PMI632, PMI8937, PMI8940, PMI8952, PMI8994, PMI8996, PMI8998, PMK8001, PMM855AU, PMM8996AU, PMX20, QAT3514, QAT3522, QAT3550, QBT1000, QBT1500, QCA6174A, QCA6310, QCA6320, QCA6564A, QCA6564AU, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA9367, QCA9377, QCA9379, QCC1110, QET4100, QET4101, QET4200AQ, QET5100, QFE2080FC, QFE2081FC, QFE2082FC, QFE2101, QFE2550, QFE3100, QFE3440FC, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFE4455FC, QFE4465FC, QLN1021AQ, QLN1030, QLN1031, QLN1035BD, QLN1036AQ, QPA4340, QPA4360, QPA5373, QPA5460, QSW8573, QTC800H, QTC800S, QTC800T, QTC801S, Qualcomm215, RGR7640AU, RSW8577, SD 636, SD439, SD450, SD660, SD710, SD712, SD820, SD821, SD835, SDM630, SDM830, SDR051, SDR052, SDR660, SDW2500, SDW3100, SDX20, SDX20M, SDX50M, SMB1350, SMB1351, SMB1355, SMB1357, SMB1358, SMB1360, SMB1380, SMB231, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3980, WCN3990, WGR7640, WSA8810, WSA8815, WTR2955, WTR2965, WTR3905, WTR3925, WTR3950, WTR4905, WTR5975"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Qualcomm, Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A process can potentially cause a buffer overflow in the display service allowing privilege escalation by executing code as that service in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Buffer Copy Without Checking Size of Input in Display"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
|
|
}
|
|
]
|
|
}
|
|
} |