Multiple Vulnerabilities in Prima Wi-Fi Driver (CVE-2016-2471, CVE-2016-2473)
Release Date:
July 21, 2016
Affected Projects:
Android for MSMFirefox OS for MSMQRD Android
Advisory ID:
QCIR-2016-00022-1
CVE ID(s):
Summary:
CVE-2016- 2471 When ioctl SIOCSIWSCAN receives SSID length greater than the valid length 32, a write buffer overflow occurs. Vulnerability: CWE-242 Use of Inherently Dangerous Functions CVE-2016-2473 When invoking the WLAN_SET_PACKET_FILTER_PARAMS ioctl, there is no validation of the parameters passed to the iw_set_packet_filter_params function. This could lead to an information exposure. Vulnerability: CWE-20 Improper Input Validation
Access Vector: Local
Security Risk: High
Access Vector: Local
Affected Versions:
All Android releases from CAF using the following heads: KitKat, Lollipop, Marshmallow
Patch:
We advise customers to apply the following patches:
Individual Patches
- CVE-2016-2471: https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=2c8961821b7691a95cbf5ecc6996e8229d6d5303
- CVE-2016-2473: https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/CORE/HDD/src/wlan_hdd_wext.c?id=0273cba64b0436d481e09222a631a6acc274b96c
Note: These issues (CVE-2016-2471, CVE-2016-2473) have been published in the Android Security Bulletin—June 2016 (http://source.android.com/security/bulletin/2016-06-01.html)
Acknowledgement:
This issue was reported to Google by a security researcher. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.
Revisions:
Initial revision