Buffer overflow in Google Android - CVE-2018-11298
Published: September 18, 2018 / Updated: August 8, 2020
Google Android
Detailed vulnerability description
The vulnerability allows a local authenticated user to execute arbitrary code.
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing SET_PASSPOINT_LIST vendor command HDD does not make sure that the realm string that gets passed by upper-layer is NULL terminated. This may lead to buffer overflow as strlen is used to get realm string length to construct the PASSPOINT WMA command.
How to mitigate CVE-2018-11298
Sources
- https://source.android.com/security/bulletin/pixel/2018-09-01#qualcomm-components
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9074c6cfb9c0bbfe279394eec0d3176c4f75ce80
- https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin