An issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart.
References
Link | Resource |
---|---|
https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | Vendor Advisory |
https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 08:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://semiconductor.samsung.com/support/quality-support/product-security-updates/ - Vendor Advisory |
Information
Published : 2023-08-08 20:15
Updated : 2024-11-21 08:09
NVD link : CVE-2023-36482
Mitre link : CVE-2023-36482
CVE.ORG link : CVE-2023-36482
JSON object : View
Products Affected
samsung
- s3nrn4v_firmware
- sen82ab
- s3nsn4v
- sen82ab_firmware
- s3nrn4v
- s3nrn82
- s3nsen4_firmware
- s3nsen4
- s3nrn82_firmware
- s3nsn4v_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')