CVE Vulnerabilities

CVE-2020-11180

Improper Restriction of Operations within the Bounds of a Memory Buffer

Published: Jan 21, 2021 | Modified: Jan 30, 2021
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Weakness

The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

Affected Software

Name Vendor Start Version End Version
Aqt1000 Qualcomm - (including) - (including)
Pm3003a Qualcomm - (including) - (including)
Pm6150 Qualcomm - (including) - (including)
Pm7150a Qualcomm - (including) - (including)
Pm7150l Qualcomm - (including) - (including)
Pm7250 Qualcomm - (including) - (including)
Pm7250b Qualcomm - (including) - (including)
Pm8004 Qualcomm - (including) - (including)
Pm8008 Qualcomm - (including) - (including)
Pm8009 Qualcomm - (including) - (including)
Pm8150 Qualcomm - (including) - (including)
Pm8150a Qualcomm - (including) - (including)
Pm8150b Qualcomm - (including) - (including)
Pm8150c Qualcomm - (including) - (including)
Pm8150l Qualcomm - (including) - (including)
Pm8250 Qualcomm - (including) - (including)
Pm855 Qualcomm - (including) - (including)
Pm855b Qualcomm - (including) - (including)
Pm855l Qualcomm - (including) - (including)
Pm855p Qualcomm - (including) - (including)
Pmc1000h Qualcomm - (including) - (including)
Pmk8002 Qualcomm - (including) - (including)
Pmk8003 Qualcomm - (including) - (including)
Pmm6155au Qualcomm - (including) - (including)
Pmm8155au Qualcomm - (including) - (including)
Pmm8195au Qualcomm - (including) - (including)
Pmm855au Qualcomm - (including) - (including)
Pmr525 Qualcomm - (including) - (including)
Pmr735b Qualcomm - (including) - (including)
Pmx50 Qualcomm - (including) - (including)
Pmx55 Qualcomm - (including) - (including)
Qat3516 Qualcomm - (including) - (including)
Qat3518 Qualcomm - (including) - (including)
Qat3519 Qualcomm - (including) - (including)
Qat3555 Qualcomm - (including) - (including)
Qat5515 Qualcomm - (including) - (including)
Qat5522 Qualcomm - (including) - (including)
Qat5533 Qualcomm - (including) - (including)
Qbt1500 Qualcomm - (including) - (including)
Qbt2000 Qualcomm - (including) - (including)
Qca6390 Qualcomm - (including) - (including)
Qca6391 Qualcomm - (including) - (including)
Qca6420 Qualcomm - (including) - (including)
Qca6421 Qualcomm - (including) - (including)
Qca6426 Qualcomm - (including) - (including)
Qca6430 Qualcomm - (including) - (including)
Qca6431 Qualcomm - (including) - (including)
Qca6436 Qualcomm - (including) - (including)
Qca6574 Qualcomm - (including) - (including)
Qca6574a Qualcomm - (including) - (including)
Qca6574au Qualcomm - (including) - (including)
Qca6595au Qualcomm - (including) - (including)
Qca6696 Qualcomm - (including) - (including)
Qdm2301 Qualcomm - (including) - (including)
Qdm2305 Qualcomm - (including) - (including)
Qdm3301 Qualcomm - (including) - (including)
Qdm5620 Qualcomm - (including) - (including)
Qdm5621 Qualcomm - (including) - (including)
Qdm5650 Qualcomm - (including) - (including)
Qdm5652 Qualcomm - (including) - (including)
Qdm5670 Qualcomm - (including) - (including)
Qdm5671 Qualcomm - (including) - (including)
Qdm5677 Qualcomm - (including) - (including)
Qdm5679 Qualcomm - (including) - (including)
Qet4101 Qualcomm - (including) - (including)
Qet5100 Qualcomm - (including) - (including)
Qet6110 Qualcomm - (including) - (including)
Qfs2530 Qualcomm - (including) - (including)
Qfs2580 Qualcomm - (including) - (including)
Qln4642 Qualcomm - (including) - (including)
Qln4650 Qualcomm - (including) - (including)
Qln5020 Qualcomm - (including) - (including)
Qln5030 Qualcomm - (including) - (including)
Qln5040 Qualcomm - (including) - (including)
Qpa2625 Qualcomm - (including) - (including)
Qpa5580 Qualcomm - (including) - (including)
Qpa6560 Qualcomm - (including) - (including)
Qpa8673 Qualcomm - (including) - (including)
Qpa8686 Qualcomm - (including) - (including)
Qpa8801 Qualcomm - (including) - (including)
Qpa8802 Qualcomm - (including) - (including)
Qpa8803 Qualcomm - (including) - (including)
Qpa8821 Qualcomm - (including) - (including)
Qpa8842 Qualcomm - (including) - (including)
Qpm4650 Qualcomm - (including) - (including)
Qpm5620 Qualcomm - (including) - (including)
Qpm5621 Qualcomm - (including) - (including)
Qpm5657 Qualcomm - (including) - (including)
Qpm5658 Qualcomm - (including) - (including)
Qpm5670 Qualcomm - (including) - (including)
Qpm5677 Qualcomm - (including) - (including)
Qpm5679 Qualcomm - (including) - (including)
Qpm6582 Qualcomm - (including) - (including)
Qpm6585 Qualcomm - (including) - (including)
Qpm8820 Qualcomm - (including) - (including)
Qpm8830 Qualcomm - (including) - (including)
Qpm8895 Qualcomm - (including) - (including)
Qsm7250 Qualcomm - (including) - (including)
Qsm8250 Qualcomm - (including) - (including)
Qtc800h Qualcomm - (including) - (including)
Qtc801s Qualcomm - (including) - (including)
Qtm525 Qualcomm - (including) - (including)
Sa6145p Qualcomm - (including) - (including)
Sa6150p Qualcomm - (including) - (including)
Sa6155 Qualcomm - (including) - (including)
Sa6155p Qualcomm - (including) - (including)
Sa8150p Qualcomm - (including) - (including)
Sa8155 Qualcomm - (including) - (including)
Sa8155p Qualcomm - (including) - (including)
Sa8195p Qualcomm - (including) - (including)
Sc8180x+sdx55 Qualcomm - (including) - (including)
Sd730 Qualcomm - (including) - (including)
Sd765 Qualcomm - (including) - (including)
Sd765g Qualcomm - (including) - (including)
Sd768g Qualcomm - (including) - (including)
Sd855 Qualcomm - (including) - (including)
Sd8655g Qualcomm - (including) - (including)
Sd8c Qualcomm - (including) - (including)
Sd8cx Qualcomm - (including) - (including)
Sdr051 Qualcomm - (including) - (including)
Sdr052 Qualcomm - (including) - (including)
Sdr660 Qualcomm - (including) - (including)
Sdr735 Qualcomm - (including) - (including)
Sdr8150 Qualcomm - (including) - (including)
Sdr8250 Qualcomm - (including) - (including)
Sdr865 Qualcomm - (including) - (including)
Sdx50m Qualcomm - (including) - (including)
Sdx55 Qualcomm - (including) - (including)
Sdx55m Qualcomm - (including) - (including)
Sdxr25g Qualcomm - (including) - (including)
Sm7250p Qualcomm - (including) - (including)
Smb1355 Qualcomm - (including) - (including)
Smb1381 Qualcomm - (including) - (including)
Smb1390 Qualcomm - (including) - (including)
Smb1395 Qualcomm - (including) - (including)
Smb2351 Qualcomm - (including) - (including)
Smr525 Qualcomm - (including) - (including)
Smr526 Qualcomm - (including) - (including)
Wcd9340 Qualcomm - (including) - (including)
Wcd9341 Qualcomm - (including) - (including)
Wcd9370 Qualcomm - (including) - (including)
Wcd9371 Qualcomm - (including) - (including)
Wcd9375 Qualcomm - (including) - (including)
Wcd9380 Qualcomm - (including) - (including)
Wcd9385 Qualcomm - (including) - (including)
Wcn3910 Qualcomm - (including) - (including)
Wcn3980 Qualcomm - (including) - (including)
Wcn3988 Qualcomm - (including) - (including)
Wcn3990 Qualcomm - (including) - (including)
Wcn3991 Qualcomm - (including) - (including)
Wcn3998 Qualcomm - (including) - (including)
Wcn6750 Qualcomm - (including) - (including)
Wcn6850 Qualcomm - (including) - (including)
Wcn6851 Qualcomm - (including) - (including)
Wsa8810 Qualcomm - (including) - (including)
Wsa8815 Qualcomm - (including) - (including)
Wsa8830 Qualcomm - (including) - (including)
Wsa8835 Qualcomm - (including) - (including)

Extended Description

Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • For example, many languages that perform their own memory management, such as Java and Perl, are not subject to buffer overflows. Other languages, such as Ada and C#, typically provide overflow protection, but the protection can be disabled by the programmer.

  • Be wary that a language’s interface to native code may still be subject to overflows, even if the language itself is theoretically safe.

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Examples include the Safe C String Library (SafeStr) by Messier and Viega [REF-57], and the Strsafe.h library from Microsoft [REF-56]. These libraries provide safer versions of overflow-prone string-handling functions.

  • Use automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking.

  • D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses canary-based detection in detail.

  • Consider adhering to the following rules when allocating and managing an application’s memory:

  • Run or compile the software using features or extensions that randomly arrange the positions of a program’s executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code.

  • Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported modules may be similarly realigned if their default memory addresses conflict with other modules, in a process known as “rebasing” (for Windows) and “prelinking” (for Linux) [REF-1332] using randomly generated addresses. ASLR for libraries cannot be used in conjunction with prelink since it would require relocating the libraries at run-time, defeating the whole purpose of prelinking.

  • For more information on these techniques see D3-SAOR (Segment Address Offset Randomization) from D3FEND [REF-1335].

  • Use a CPU and operating system that offers Data Execution Protection (using hardware NX or XD bits) or the equivalent techniques that simulate this feature in software, such as PaX [REF-60] [REF-61]. These techniques ensure that any instruction executed is exclusively at a memory address that is part of the code segment.

  • For more information on these techniques see D3-PSEP (Process Segment Execution Prevention) from D3FEND [REF-1336].

References