There is a buffer overwrite vulnerability in the Quram qmg library of Samsung's Android OS versions O(8.x), P(9.0) and Q(10.0). An unauthenticated, unauthorized attacker sending a specially crafted MMS to a vulnerable phone can trigger a heap-based buffer overflow in the Quram image codec leading to an arbitrary remote code execution (RCE) without any user interaction. The Samsung ID is SVE-2020-16747.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://security.samsungmobile.com/securityUpdate.smsb | vendor advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=2002 | third party advisory issue tracking exploit |
http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html | third party advisory vdb entry |
https://www.kb.cert.org/vuls/id/366027 | third party advisory us government resource |