mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
68 lines
2.2 KiB
JSON
68 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@qualcomm.com",
|
|
"DATE_PUBLIC": "2017-11-01T00:00:00",
|
|
"ID": "CVE-2017-11013",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Android for MSM, Firefox OS for MSM, QRD Android",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All Android releases from CAF using the Linux kernel"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Qualcomm, Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, countOffset (in function UnpackCore) is increased for each loop, while there is no boundary check against \"pIe->arraybound\"."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Stack-based Buffer Overflow in WLAN"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "101774",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/101774"
|
|
},
|
|
{
|
|
"name": "https://source.android.com/security/bulletin/2017-11-01",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://source.android.com/security/bulletin/2017-11-01"
|
|
}
|
|
]
|
|
}
|
|
} |