SB2017042014 - Multiple vulnerabilities in Samsung Mobile



SB2017042014 - Multiple vulnerabilities in Samsung Mobile

Published: April 20, 2017 Updated: August 8, 2020

Security Bulletin ID SB2017042014
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 63% Medium 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2018-10751)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A malformed OMACP WAP push message can cause memory corruption on a Samsung S7 Edge device when processing the String Extension portion of the WbXml payload. This is due to an integer overflow in memory allocation for this string. The Samsung ID is SVE-2018-11463.


2) Buffer overflow (CVE-ID: CVE-2018-9139)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

On Samsung mobile devices with N(7.x) software, a buffer overflow in the vision service allows code execution in a privileged process via a large frame size, aka SVE-2017-11165.


3) Input validation error (CVE-ID: CVE-2018-9141)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

On Samsung mobile devices with L(5.x), M(6.0), and N(7.x) software, Gallery allows remote attackers to execute arbitrary code via a BMP file with a crafted resolution, aka SVE-2017-11105.


4) Input validation error (CVE-ID: CVE-2018-9142)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

On Samsung mobile devices with N(7.x) software, attackers can install an arbitrary APK in the Secure Folder SD Card area because of faulty validation of a package signature and package name, aka SVE-2017-10932.


5) Buffer overflow (CVE-ID: CVE-2018-9143)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

On Samsung mobile devices with M(6.0) and N(7.x) software, a heap overflow in the sensorhub binder service leads to code execution in a privileged process, aka SVE-2017-10991.


6) Input validation error (CVE-ID: CVE-2017-18020)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

On Samsung mobile devices with L(5.x), M(6.x), and N(7.x) software and Exynos chipsets, attackers can execute arbitrary code in the bootloader because S Boot omits a size check during a copy of ramfs data to memory. The Samsung ID is SVE-2017-10598.


7) Buffer overflow (CVE-ID: CVE-2018-5210)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

On Samsung mobile devices with N(7.x) software and Exynos chipsets, attackers can conduct a Trustlet stack overflow attack for arbitrary TEE code execution, in conjunction with a brute-force attack to discover unlock information (PIN, password, or pattern). The Samsung ID is SVE-2017-10733.


8) Information disclosure (CVE-ID: CVE-2017-7978)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Samsung Android devices with L(5.0/5.1), M(6.0), and N(7.x) software allow attackers to obtain sensitive information by reading a world-readable log file after an unexpected reboot. The Samsung ID is SVE-2017-8290.


Remediation

Install update from vendor's website.