Vulnerability
CVE-2017-18172
Component: TRUST
In a device, with screen size 1440x2560, the check of contiguous buffer will overflow on certain buffer size resulting in an Integer Overflow or Wraparound in System UI in Snapdragon Automobile, Snapdragon Mobile in version MDM9635M, SD 400, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 820A, SD 835, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016.
Impact
Severity (Manufact.)
N/A
Severity (NIST)
7.8
Severity (Android)
N/A
Chipsets
43
Devices
1413
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8230 | Snapdragon 400 | Qualcomm |
MSM8630 | Snapdragon 400 | Qualcomm |
MSM8930 | Snapdragon 400 | Qualcomm |
MSM8226 | Snapdragon 400 | Qualcomm |
MSM8626 | Snapdragon 400 | Qualcomm |
MSM8926 | Snapdragon 400 | Qualcomm |
MSM8228 | Snapdragon 400 | Qualcomm |
MSM8628 | Snapdragon 400 | Qualcomm |
MSM8928 | Snapdragon 400 | Qualcomm |
MSM8930AA | Snapdragon 400 | Qualcomm |
43 of 43 row(s) shown.
Rows per page
Page 1 of 5
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2013
Reported:
Unknown
Advisory Published:
Oct 1, 2018
CVE Published:
Oct 23, 2018
Android Patch Level:
Jul 2018