CVE-2018-9403

In the MTK_FLP_MSG_HAL_DIAG_REPORT_DATA_NTF handler of flp2hal_- interface.c, there is a possible stack buffer overflow due to a missing bounds check. This could lead to local escalation of privilege in a privileged process with System execution privileges needed. User interaction is not needed for exploitation.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

History

19 Dec 2024, 16:42

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 6.7
First Time Google
Google android
References () https://source.android.com/security/bulletin/pixel/2018-06-01 - () https://source.android.com/security/bulletin/pixel/2018-06-01 - Vendor Advisory

05 Dec 2024, 17:15

Type Values Removed Values Added
Summary
  • (es) En el controlador MTK_FLP_MSG_HAL_DIAG_REPORT_DATA_NTF de flp2hal_- interface.c, existe un posible desbordamiento del búfer de pila debido a la falta de una comprobación de los límites. Esto podría provocar una escalada local de privilegios en un proceso privilegiado con permisos de ejecución de System necesarios. No se necesita la interacción del usuario para la explotación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-120

05 Dec 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-05 00:15

Updated : 2024-12-19 16:42


NVD link : CVE-2018-9403

Mitre link : CVE-2018-9403

CVE.ORG link : CVE-2018-9403


JSON object : View

Products Affected

google

  • android
CWE
CWE-787

Out-of-bounds Write

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')