Buffer overflow in prot_get_ring_space in the bcmdhd4358 Wi-Fi driver on the Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 allows an attacker (who has obtained code execution on the Wi-Fi chip) to overwrite kernel memory due to improper validation of the ring buffer read pointer. The Samsung ID is SVE-2018-12029.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://pastebin.com/tmFrECnZ | third party advisory exploit |
https://security.samsungmobile.com/securityUpdate.smsb | vendor advisory |
https://github.com/securesystemslab/periscope/blob/master/bugs-found/CVE-2018-14745.md | third party advisory exploit |