• Sign in

CVE-2015-9185

    CVE-2015-9185  
Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, in multiple Secure DEMUX functions (e.g., SDMX_open_session, SDMX_close_session, SDMX_set_session_cfg), when parameter validation fails, an error code is written into a response buffer, without checking that response buffer length (rsplen) passed from HLOS is large enough to hold the response. If the buffer is at the end of a non-secure page followed by secured memory page, this can cause a secure memory corruption.
Impact
  CVSS v3 : 9.8 CRITICAL  

  CVSS v2 : 10 HIGH  
Type
  CWE-119  
Attack Vector
CVSSv2 Vector : AV:N/AC:L/Au:N/C:C/I:C/A:C
Quick linksCVE, NVD, CERT, Metasploit, Exploit-db, Fulldisc, Bugtraq, Microsoft, Red Hat, Debian, GitHub code/issues, Google
References
http://www.securityfocus.com/bid/103671
https://source.android.com/security/bulletin/2018-04-01
  • FAQ
  • Terms of service
  • Privacy policy