First published: Mon Oct 05 2020(Updated: )
u'Buffer overflow can happen as part of SIP message packet processing while storing values in array due to lack of check to validate the index length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, Nicobar, QCA6390, QCA6574AU, QCM2150, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm Agatti Firmware | ||
Qualcomm Agatti Firmware | ||
qualcomm apq8053-ac firmware | ||
Qualcomm APQ8053 Firmware | ||
Qualcomm APQ8096AU Firmware | ||
Qualcomm APQ8096AU Firmware | ||
qualcomm APQ8098 | ||
Qualcomm 8098 | ||
Qualcomm Bitra | ||
Qualcomm Bitra Firmware | ||
Qualcomm Kamorta | ||
qualcomm Kamorta firmware | ||
Qualcomm 8905 Firmware | ||
Qualcomm 8905 | ||
Qualcomm MSM8909W | ||
Qualcomm Snapdragon 8909 | ||
Qualcomm MSM8917 | ||
Qualcomm MSM8917 Firmware | ||
qualcomm MSM8940 firmware | ||
Qualcomm 8940 | ||
Qualcomm 8953 Firmware | ||
Qualcomm MSM8953 Firmware | ||
qualcomm MSM8996AU firmware | ||
Qualcomm MSM8996AU Firmware | ||
Qualcomm Nicobar | ||
Qualcomm Nicobar | ||
Qualcomm QCA6390 Firmware | ||
Qualcomm QCA6390 Firmware | ||
Qualcomm QCA6574 Firmware | ||
Qualcomm QCA6574AU | ||
Qualcomm QCM2150 | ||
Qualcomm QCM2150 Firmware | ||
Qualcomm ZZ QCS605 firmware | ||
Qualcomm QCS605 Firmware | ||
Qualcomm 215 Firmware | ||
Qualcomm 215 | ||
Qualcomm Rennell | ||
qualcomm Rennell firmware | ||
Qualcomm SA6155 | ||
Qualcomm SA6155P | ||
Qualcomm SA8155 | ||
Qualcomm SA8155P Firmware | ||
Qualcomm Saipan Firmware | ||
Qualcomm Saipan Firmware | ||
Qualcomm SDA660 | ||
Qualcomm SDA660 | ||
Qualcomm SDM429W | ||
Qualcomm SD429 | ||
Qualcomm SDM429W | ||
qualcomm SDM429W firmware | ||
qualcomm SDM439 firmware | ||
Qualcomm SDM439 Firmware | ||
Qualcomm SD 450 Firmware | ||
Qualcomm Snapdragon 450 | ||
qualcomm SDM630 firmware | ||
qualcomm SDM630 | ||
Qualcomm SDM632 | ||
Qualcomm SDM632 | ||
Qualcomm SD 636 Firmware | ||
Qualcomm SDM636 Firmware | ||
Qualcomm SD660 Firmware | ||
Qualcomm Snapdragon 660 | ||
Qualcomm SD 670 Firmware | ||
Qualcomm SDM670 Firmware | ||
Qualcomm SD710 Firmware | ||
Qualcomm Snapdragon 710 | ||
Qualcomm SDA/SDM845 Firmware | ||
Qualcomm Snapdragon 845 | ||
qualcomm SM6150P firmware | ||
Qualcomm SM6150P | ||
qualcomm SM7150 firmware | ||
qualcomm SM7150 firmware | ||
Qualcomm SM8150P Firmware | ||
Qualcomm SM8150 Fusion | ||
Qualcomm SM8250 | ||
Qualcomm qsm8250 | ||
Qualcomm SXR1130 | ||
Qualcomm SXR1130 Firmware | ||
qualcomm SXR2130P firmware | ||
Qualcomm SXR2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3673 is classified as a high severity vulnerability due to the potential for excessive resource consumption or application crash.
To fix CVE-2020-3673, users should update their affected Qualcomm Snapdragon firmware to the latest available version provided by the vendor.
CVE-2020-3673 affects various devices running Qualcomm's Snapdragon firmware, including those in automotive, mobile, and IoT applications.
CVE-2020-3673 is a buffer overflow vulnerability that can occur during the SIP message packet processing.
Yes, CVE-2020-3673 may be remotely exploitable if the vulnerable Snapdragon firmware processes specially crafted SIP messages.