漏洞标题
N/A
漏洞描述信息
在将帧复制到本地缓冲区时可能由于在复制之前缺乏对长度的检查而在Snapdragon Auto、Snapdragon Compute、Snapdragon Connectivity、Snapdragon Consumer Electronics Connectivity、Snapdragon Consumer IOT、Snapdragon Industrial IOT、Snapdragon IoT、Snapdragon Mobile、Snapdragon Voice & Music、Snapdragon Wearables、Snapdragon Wired Infrastructure and Networking在APQ8009、APQ8017、APQ8053、APQ8076、APQ8096、APQ8096AU、APQ8098、IPQ6018、IPQ8074、MDM9206、MDM9207C、MDM9607、MDM9640、MDM9650、MSM8905、MSM8909、MSM8909W、MSM8917、MSM8920、MSM8937、MSM8940、MSM8953、MSM8996AU、MSM8998、Nicobar、QCA6174A、QCA6574AU、QCA6584AU、QCA9377、QCA9379、QCA9886、QCM2150、QCS405、QCS605、QM215、 Rennell、SC7180、SC8180X、SDM429、SDM429W、SDM439、SDM450、SDM630、SDM632、SDM636、SDM660、SDM670、SDM710、SDM845、SXR20、SXR24、SM6150、SM7150、SM8150、SXR1130" 的翻译为:
在将帧复制到本地缓冲区时,由于在复制之前缺乏对长度的检查而在Snapdragon Auto、Snapdragon Compute、Snapdragon Connectivity、Snapdragon Consumer Electronics Connectivity、Snapdragon Consumer IOT、Snapdragon Industrial IOT、Snapdragon IoT、Snapdragon Mobile、Snapdragon Voice & Music、Snapdragon Wearables、Snapdragon Wired Infrastructure and Networking在APQ8009、APQ8017、APQ8053、APQ8076、APQ8096、APQ8096AU、APQ8098、IPQ6018、IPQ8074、MDM9206、MDM9207C、MDM9607、MDM9640、MDM9650、MSM8905、MSM8909、MSM8909W、MSM8917、MSM8920、MSM8937、MSM8940、MSM8953、MSM8996AU、MSM8998、Nicobar、QCA6174A、QCA6574AU、QCA6584AU、QCA9377、QCA9379、QCA9886、QCM2150、QCS405、QCS605、QM215、 Rennell、SC7180、SC8180X、SDM429、SDM429W、SDM439、SDM450、SDM630、SDM632、SDM636、SDM660、SDM670、SDM710、SDM845、SXR20、SXR24、SM6150、SM7150、SM8150、SXR1130
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Possible buffer overflow while copying the frame to local buffer due to lack of check of length before copying in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6174A, QCA6574AU, QCA6584AU, QCA9377, QCA9379, QCA9886, QCM2150, QCS405, QCS605, QM215, Rennell, SC7180, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
多款Qualcomm产品缓冲区错误漏洞
漏洞描述信息
Qualcomm SDX20等都是美国高通(Qualcomm)公司的产品。SDX20是一款调制解调器。APQ8017是一款中央处理器(CPU)产品。APQ8009是一款中央处理器(CPU)产品。 多款Qualcomm产品中的WLAN存在缓冲区错误漏洞,该漏洞源于程序没有正确检查边界。远程攻击者可借助特制请求利用该漏洞在系统上执行任意代码。以下产品及版本受到影响:Qualcomm APQ8009;APQ8017;APQ8053;APQ8076;APQ8096;APQ8096AU;APQ8098;IPQ601
CVSS信息
N/A
漏洞类别
缓冲区错误