#VU67834 Double Free in Qualcomm Mobile applications


Published: 2022-10-03

Vulnerability identifier: #VU67834

Vulnerability risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25750

CWE-ID: CWE-415

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Kailua
Mobile applications / Mobile firmware & hardware
SG8275
Mobile applications / Mobile firmware & hardware
SG8275P
Mobile applications / Mobile firmware & hardware
SM8550
Mobile applications / Mobile firmware & hardware
WCD9380
Mobile applications / Mobile firmware & hardware
WCD9385
Mobile applications / Mobile firmware & hardware
WCD9390
Mobile applications / Mobile firmware & hardware
WCD9395
Mobile applications / Mobile firmware & hardware
WCN6855
Mobile applications / Mobile firmware & hardware
WCN6856
Mobile applications / Mobile firmware & hardware
WCN7850
Mobile applications / Mobile firmware & hardware
WCN7851
Mobile applications / Mobile firmware & hardware
WSA8840
Mobile applications / Mobile firmware & hardware
WSA8845
Mobile applications / Mobile firmware & hardware
WSA8845H
Mobile applications / Mobile firmware & hardware

Vendor: Qualcomm

Description

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within Bluetooth HOST while music playback and calls over bluetooth headset. An attacker with physical proximity to device can trigger a double free error and execute arbitrary code on the target system.


Mitigation
Install updates from vendor's website.

Vulnerable software versions

Kailua: All versions

SG8275: All versions

SG8275P: All versions

SM8550: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions


External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/october-2022-bulletin.html
http://git.codelinaro.org/clo/la/kernel/msm-5.10/-/commit/0f60a0e18af70b029c135555dbdf451efd8242f3


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability