Integer Overflow Vulnerability in Qualcomm Snapdragon Mobile and Snapdragon Wear Devices

Integer Overflow Vulnerability in Qualcomm Snapdragon Mobile and Snapdragon Wear Devices

CVE-2015-9190 · HIGH Severity

AV:N/AC:L/AU:N/C:C/I:C/A:C

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 600, SD 615/16/SD 415, SD 808, and SD 810, if start_addr + size is too large in boot_clobber_check_local_address_range(), an integer overflow occurs, resulting in clobber protection check being bypassed and SBL memory corruption.

Learn more about our Cis Benchmark Audit For Google Android.