Lucene search

K
cvelistQualcommCVELIST:CVE-2024-33054
HistorySep 02, 2024 - 10:22 a.m.

CVE-2024-33054 Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Computer Vision

2024-09-0210:22:44
CWE-120
qualcomm
www.cve.org
3
cve-2024-33054
buffer copy
input size
classic buffer overflow
computer vision
memory corruption
handshake
primary virtual machine
trusted virtual machine

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.6%

Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Snapdragon Auto",
      "Snapdragon Compute",
      "Snapdragon Consumer IOT",
      "Snapdragon Industrial IOT",
      "Snapdragon Mobile",
      "Snapdragon Wearables"
    ],
    "product": "Snapdragon",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "FastConnect 6700"
      },
      {
        "status": "affected",
        "version": "FastConnect 6900"
      },
      {
        "status": "affected",
        "version": "FastConnect 7800"
      },
      {
        "status": "affected",
        "version": "QCM5430"
      },
      {
        "status": "affected",
        "version": "QCM6490"
      },
      {
        "status": "affected",
        "version": "QCM8550"
      },
      {
        "status": "affected",
        "version": "QCS5430"
      },
      {
        "status": "affected",
        "version": "QCS6490"
      },
      {
        "status": "affected",
        "version": "QCS8550"
      },
      {
        "status": "affected",
        "version": "Qualcomm Video Collaboration VC3 Platform"
      },
      {
        "status": "affected",
        "version": "SDM429W"
      },
      {
        "status": "affected",
        "version": "SG8275P"
      },
      {
        "status": "affected",
        "version": "SM8550P"
      },
      {
        "status": "affected",
        "version": "SM8635"
      },
      {
        "status": "affected",
        "version": "Snapdragon 429 Mobile Platform"
      },
      {
        "status": "affected",
        "version": "Snapdragon 8 Gen 2 Mobile Platform"
      },
      {
        "status": "affected",
        "version": "Snapdragon 8 Gen 3 Mobile Platform"
      },
      {
        "status": "affected",
        "version": "Snapdragon 8+ Gen 2 Mobile Platform"
      },
      {
        "status": "affected",
        "version": "WCD9370"
      },
      {
        "status": "affected",
        "version": "WCD9375"
      },
      {
        "status": "affected",
        "version": "WCD9380"
      },
      {
        "status": "affected",
        "version": "WCD9385"
      },
      {
        "status": "affected",
        "version": "WCD9390"
      },
      {
        "status": "affected",
        "version": "WCD9395"
      },
      {
        "status": "affected",
        "version": "WCN3620"
      },
      {
        "status": "affected",
        "version": "WCN3660B"
      },
      {
        "status": "affected",
        "version": "WCN6755"
      },
      {
        "status": "affected",
        "version": "WSA8830"
      },
      {
        "status": "affected",
        "version": "WSA8832"
      },
      {
        "status": "affected",
        "version": "WSA8835"
      },
      {
        "status": "affected",
        "version": "WSA8840"
      },
      {
        "status": "affected",
        "version": "WSA8845"
      },
      {
        "status": "affected",
        "version": "WSA8845H"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.6%

Related for CVELIST:CVE-2024-33054