René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
3.8 KiB
JSON

{
"id": "CVE-2017-9677",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2017-09-21T15:29:00.867",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In all Qualcomm products with Android releases from CAF using the Linux kernel, in function msm_compr_ioctl_shared, variable \"ddp->params_length\" could be accessed and modified by multiple threads, while it is not protected with locks. If one thread is running, while another thread is setting data, race conditions will happen. If \"ddp->params_length\" is set to a big number, a buffer overflow will occur."
},
{
"lang": "es",
"value": "En la funci\u00f3n msm_compr_ioctl_shared en todos los productos Qualcomm con distribuciones Android desde CAF empleando el kernel Linux, se podr\u00eda acceder a la variable \"ddp->params_length\" y modificarla empleando m\u00faltiples subprocesos, siempre y cuando no est\u00e9 protegida por locks. Si un subproceso se est\u00e1 ejecutando mientras otro establece los datos, ocurrir\u00e1 una condici\u00f3n de carrera. Si se establece \"ddp->params_length\" con un n\u00famero grande, ocurrir\u00e1 un desbordamiento de b\u00fafer."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0",
"matchCriteriaId": "EFB2D835-93F5-428E-A606-2DA253C97EB6"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/100658",
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://source.android.com/security/bulletin/2017-09-01",
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}