In Android prior to 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 600, SD 615/16/SD 415, SD 808, and SD 810, if start_addr + size is too large in boot_clobber_check_local_address_range(), an integer overflow occurs, resulting in clobber protection check being bypassed and SBL memory corruption.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
qualcomm mdm9206_firmware - |
||
qualcomm mdm9607_firmware - |
||
qualcomm mdm9615_firmware - |
||
qualcomm mdm9625_firmware - |
||
qualcomm mdm9635m_firmware - |
||
qualcomm ipq4019_firmware - |
||
qualcomm msm8909w_firmware - |
||
qualcomm sd_210_firmware - |
||
qualcomm sd_212_firmware - |
||
qualcomm sd_205_firmware - |
||
qualcomm sd_400_firmware - |
||
qualcomm sd_410_firmware - |
||
qualcomm sd_412_firmware - |
||
qualcomm sd_600_firmware - |
||
qualcomm sd_615_firmware - |
||
qualcomm sd_616_firmware - |
||
qualcomm sd_415_firmware - |
||
qualcomm sd_808_firmware - |
||
qualcomm sd_810_firmware - |