First published: Mon Apr 02 2018(Updated: )
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile MDM9650, MDM9655, SD 835, SD 845, SD 850, the vswr capture size is larger than the maximum size of a diag logPacket, which can lead to a buffer overflow when the sample buffer is copied to the logPacket buffer.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm MDM9650 | ||
Qualcomm MDM9650 firmware | ||
Qualcomm MDM9655 firmware | ||
Qualcomm MDM9655 firmware | ||
Qualcomm SD835 Firmware | ||
Qualcomm Snapdragon 835 | ||
Qualcomm SDA845 Firmware | ||
Qualcomm SD845 | ||
Qualcomm SD850 Firmware | ||
Qualcomm SD850 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3589 has a high severity rating due to the potential for a buffer overflow which can lead to exploitation.
To address CVE-2018-3589, update your Qualcomm Snapdragon firmware to the security patch level released on or after 2018-04-05.
CVE-2018-3589 affects certain Qualcomm Snapdragon mobile modem devices such as MDM9650, MDM9655, SD 835, SD 845, and SD 850.
Exploitation of CVE-2018-3589 could allow an attacker to execute arbitrary code, leading to unauthorized access and data leaks.
CVE-2018-3589 is considered a local vulnerability, as it requires local access to the affected device to exploit.