{"containers":{"cna":{"affected":[{"product":"Android for MSM, Firefox OS for MSM, QRD Android","vendor":"Qualcomm, Inc.","versions":[{"status":"affected","version":"All Android releases from CAF using the Linux kernel"}]}],"datePublic":"2018-09-04T00:00:00.000Z","descriptions":[{"lang":"en","value":"In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing start bss request from upper layer, out of bounds read occurs if ssid length is greater than maximum."}],"problemTypes":[{"descriptions":[{"description":"Buffer Copy Without Checking Size of Input in WLAN","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-09-19T13:57:01.000Z","orgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","shortName":"qualcomm"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"},{"tags":["x_refsource_CONFIRM"],"url":"https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dc657f502adb3038784b7488d2f183ed31b6aac3"},{"tags":["x_refsource_CONFIRM"],"url":"https://source.android.com/security/bulletin/2018-09-01#qualcomm-components"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"product-security@qualcomm.com","ID":"CVE-2018-11898","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Android for MSM, Firefox OS for MSM, QRD Android","version":{"version_data":[{"version_value":"All Android releases from CAF using the Linux kernel"}]}}]},"vendor_name":"Qualcomm, Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing start bss request from upper layer, out of bounds read occurs if ssid length is greater than maximum."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Buffer Copy Without Checking Size of Input in WLAN"}]}]},"references":{"reference_data":[{"name":"https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin","refsource":"CONFIRM","url":"https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"},{"name":"https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dc657f502adb3038784b7488d2f183ed31b6aac3","refsource":"CONFIRM","url":"https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dc657f502adb3038784b7488d2f183ed31b6aac3"},{"name":"https://source.android.com/security/bulletin/2018-09-01#qualcomm-components","refsource":"CONFIRM","url":"https://source.android.com/security/bulletin/2018-09-01#qualcomm-components"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T08:24:03.251Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dc657f502adb3038784b7488d2f183ed31b6aac3"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://source.android.com/security/bulletin/2018-09-01#qualcomm-components"}]}]},"cveMetadata":{"assignerOrgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","assignerShortName":"qualcomm","cveId":"CVE-2018-11898","datePublished":"2018-09-19T14:00:00.000Z","dateReserved":"2018-06-07T00:00:00.000Z","dateUpdated":"2024-08-05T08:24:03.251Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}