First published: Mon Jan 06 2020(Updated: )
Possible buffer overflow when byte array receives incorrect input from reading source as array is not null terminated in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in Nicobar, SDM670, SDM710, SDM845, SM6150, SM8150, SM8250, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm Nicobar | ||
Qualcomm Nicobar | ||
Qualcomm SD 670 Firmware | ||
Qualcomm SDM670 Firmware | ||
Qualcomm SD 710 Firmware | ||
Qualcomm Snapdragon 710 | ||
Qualcomm SDA/SDM845 Firmware | ||
Qualcomm Snapdragon 845 | ||
Qualcomm SM6150P firmware | ||
Qualcomm SM6150P | ||
Qualcomm SM8150P Firmware | ||
Qualcomm SM8150 Fusion | ||
Qualcomm SM8250 | ||
qualcomm SM8250 firmware | ||
Qualcomm SXR2130P Firmware | ||
Qualcomm SXR2130 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14014 is categorized as a high severity vulnerability due to the potential for buffer overflow.
To mitigate CVE-2019-14014, affected devices should be updated with the latest firmware provided by Qualcomm.
CVE-2019-14014 affects various Qualcomm Snapdragon products including SDM670, SDM710, SDM845, SM6150, SM8150, SM8250, and SXR2130.
CVE-2019-14014 can occur when a byte array does not receive null-terminated input, potentially leading to a buffer overflow.
Yes, if exploited, CVE-2019-14014 could allow an attacker to execute arbitrary code remotely.