First published: Mon Sep 24 2018(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5. User interaction is required to exploit this vulnerability in that the target must have their cellular radios enabled. The specific flaw exists within the handling of IPCP headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the baseband processor. Was ZDI-CAN-5368.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S8 Firmware | =g950fxxu1aql5 | |
Samsung Galaxy S8 | =sm-g950f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14318 is a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5.
CVE-2018-14318 has a severity rating of 8.8 which is considered high.
The affected software for CVE-2018-14318 is Samsung Galaxy S8 Firmware with version g950fxxu1aql5.
No, Samsung Galaxy S8 SM-G950F is not vulnerable to CVE-2018-14318.
To exploit CVE-2018-14318, user interaction is required and the target must have their cellular radios enabled.