First published: Mon Sep 09 2024(Updated: )
An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_rx_range_done_ind(), there is no input validation check on rtt_id coming from userspace, which can lead to a heap overwrite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Samsung Exynos 1080 Firmware | ||
Samsung Exynos 1080 | ||
All of | ||
Samsung Exynos 1280 firmware | ||
Samsung Exynos 1280 | ||
All of | ||
Samsung Exynos 1330 firmware | ||
Samsung Exynos 1330 firmware | ||
All of | ||
Samsung Exynos 1380 firmware | ||
Samsung Mobile Processor Exynos 1380 | ||
All of | ||
Samsung Exynos 1480 firmware | ||
Samsung Mobile Processor Exynos 1480 | ||
All of | ||
Samsung Exynos 850 firmware | ||
Samsung Exynos 850 | ||
All of | ||
Samsung Exynos 980 Firmware | ||
Samsung Exynos 980 | ||
All of | ||
Samsung Exynos W920 firmware | ||
Samsung Exynos W920 firmware | ||
All of | ||
Samsung Exynos W930 firmware | ||
Samsung Exynos W930 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27387 is classified as a medium severity vulnerability due to its potential for heap overwrite caused by lack of input validation.
To fix CVE-2024-27387, update your Samsung Mobile Processor firmware to the latest version that addresses this vulnerability.
CVE-2024-27387 affects Samsung Mobile Processors including Exynos 980, 850, 1280, 1380, and 1330.
CVE-2024-27387 can potentially allow attackers to execute arbitrary code or crash the system due to heap memory manipulation.
CVE-2024-27387 is considered to be exploitable locally since it involves an input validation flaw that requires user-supplied data.