{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T19:53:20.984","vulnerabilities":[{"cve":{"id":"CVE-2014-10043","sourceIdentifier":"product-security@qualcomm.com","published":"2018-04-18T14:29:00.277","lastModified":"2024-11-21T02:03:23.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, and SD 800, while reading PlayReady rights string information from command buffer (which is sent from non-secure side), if length of rights string is very large, a buffer over read occurs, exposing TZ App memory to non-secure side."},{"lang":"es","value":"En Android antes del nivel de parcheo de seguridad del 2018-04-05 o antes en Qualcomm Snapdragon Mobile y Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12 y SD 800, mientras se lee información de una cadena rights de PlayReady de un búfer de comando (que se envía desde un lado no seguro), si el tamaño de la cadena rights es muy grande, ocurre una sobrelectura de búfer, lo que expone la memoria TZ de la App al lado no seguro."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"FE28A59C-7AA6-4B85-84E8-07852B96108E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*","matchCriteriaId":"5DEE828B-09A7-4AC1-8134-491A7C87C118"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"0FA80D57-3191-47CF-AD3F-9F2D64E443FE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*","matchCriteriaId":"B2AFB212-F01A-4CEB-8DB4-2E0CC2308CB6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E0986EF1-0974-488E-84C4-6880F876CE55"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*","matchCriteriaId":"8C08BA58-2EBC-4A22-85A4-2ECD54693B9B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"27110478-4C08-49E6-BD53-8BAAD9D5BD65"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*","matchCriteriaId":"3664D302-D22A-4B25-B534-3097AE2F8573"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AC3C20F8-9EFD-457C-B0B2-DA3C44A8B26D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*","matchCriteriaId":"4B562043-7A0C-4692-A94F-EF4086BAA654"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"F683C42D-A310-4369-9689-3DBC9288591E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*","matchCriteriaId":"0EADE10A-0F63-4149-8F03-030673D6D7CE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A78C9449-5EB0-459B-AA72-EFF00592C30A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*","matchCriteriaId":"2D583172-F1F1-4DF8-99CE-B94A84D14CCD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"67E0DD11-0B28-4B6D-BDB7-0DBFA34A7187"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*","matchCriteriaId":"551512D0-ED24-4B5A-BEB2-B090BB8DEE0C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/103671","source":"product-security@qualcomm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://source.android.com/security/bulletin/2018-04-01","source":"product-security@qualcomm.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/103671","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://source.android.com/security/bulletin/2018-04-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}