ghsa-53jx-j2fr-5qgx
Vulnerability from github
Published
2022-05-24 17:33
Modified
2022-05-24 17:33
Details
u'Buffer overflow occurs while processing SIP message packet due to lack of check of index validation before copying into it' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6390, QCA6574AU, QCM2150, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
{ "affected": [], "aliases": [ "CVE-2020-3654" ], "database_specific": { "cwe_ids": [ "CWE-129" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-11-02T07:15:00Z", "severity": "CRITICAL" }, "details": "u\u0027Buffer overflow occurs while processing SIP message packet due to lack of check of index validation before copying into it\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6390, QCA6574AU, QCM2150, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130", "id": "GHSA-53jx-j2fr-5qgx", "modified": "2022-05-24T17:33:02Z", "published": "2022-05-24T17:33:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3654" }, { "type": "WEB", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin" }, { "type": "WEB", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin" } ], "schema_version": "1.4.0", "severity": [] }
Loading...