Skip to main content

Multiple Vulnerabilities in Prima Wi-Fi Driver (CVE-2016-2471, CVE-2016-2473)

Release Date:

July 21, 2016

Affected Projects:

Android for MSMFirefox OS for MSMQRD Android

Advisory ID:

QCIR-2016-00022-1

CVE ID(s):

CVE-2016-2471CVE-2016-2473

Summary:

CVE-2016- 2471 When ioctl SIOCSIWSCAN receives SSID length greater than the valid length 32, a write buffer overflow occurs. Vulnerability: CWE-242 Use of Inherently Dangerous Functions CVE-2016-2473 When invoking the WLAN_SET_PACKET_FILTER_PARAMS ioctl, there is no validation of the parameters passed to the iw_set_packet_filter_params function. This could lead to an information exposure. Vulnerability: CWE-20 Improper Input Validation

Access Vector: Local
Security Risk: High
Access Vector: Local

Affected Versions:

All Android releases from CAF using the following heads: KitKat, Lollipop, Marshmallow

Patch:

We advise customers to apply the following patches:

Individual Patches

Note: These issues (CVE-2016-2471, CVE-2016-2473) have been published in the Android Security Bulletin—June 2016 (http://source.android.com/security/bulletin/2016-06-01.html)

Acknowledgement:

This issue was reported to Google by a security researcher. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.

Revisions:

Initial revision

Contact:

security-advisory@quicinc.com