Out-of-bounds write in wifi driver function hdd_extscan_passpoint_fill_network_list (CVE-2017-0439)

Release Date: 
May 1, 2017
Advisory ID: 
QCIR-2017-00028-1
Summary: 

The following security vulnerabilities have been identified:

 CVE-2017-0439

Currently when processing a passpoint vendor command the "num networks" attribute is limit checked and if it exceeds a MAX value then the command is rejected. Otherwise this value is used to calculate the size of the buffer allocated to hold the internal representation of the request. However later when the network attributes are parsed there is no check to make sure the number of networks processed does not exceed the "num networks" used to allocate memory, and as a result a buffer overflow can occur.

Access Vector: Local
Security Risk: Medium
Vulnerability: CWE-129 Improper Validation of Array Index

Affected Versions:
All Android releases from CAF using the Linux kernel.

Patch: 
Acknowledgement: 

This issue was reported to Google by an external security researcher. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.

Revisions: 

Initial revision

Contact: 
security-advisory@quicinc.com