CVE-2023-43553 – Use of Out-of-range Pointer Offset in WLAN HOST
https://notcve.org/view.php?id=CVE-2023-43553
Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE. Corrupción de la memoria al analizar el marco de respuesta de baliza/sonda cuando AP envía más enlaces compatibles en MLIE. • https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin • CWE-823: Use of Out-of-range Pointer Offset •
CVE-2023-43552 – Use After Free in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2023-43552
Memory corruption while processing MBSSID beacon containing several subelement IE. Corrupción de la memoria al procesar la baliza MBSSID que contiene varios subelementos IE. • https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin • CWE-416: Use After Free •
CVE-2023-43549 – Stack-based Buffer Overflow in WLAN HAL
https://notcve.org/view.php?id=CVE-2023-43549
Memory corruption while processing TPC target power table in FTM TPC. Corrupción de la memoria al procesar la tabla de potencia objetivo de TPC en FTM TPC. • https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin • CWE-121: Stack-based Buffer Overflow •
CVE-2023-43539 – Buffer Over-read in WLAN Firmware
https://notcve.org/view.php?id=CVE-2023-43539
Transient DOS while processing an improperly formatted 802.11az Fine Time Measurement protocol frame. DOS transitorio mientras se procesa una trama del protocolo 802.11az Fine Time Measurement con formato incorrecto. • https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin • CWE-126: Buffer Over-read •
CVE-2023-33105 – Configuration Issue in WLAN Host and Firmware
https://notcve.org/view.php?id=CVE-2023-33105
Transient DOS in WLAN Host and Firmware when large number of open authentication frames are sent with an invalid transaction sequence number. DOS transitorio en el host y el firmware de WLAN cuando se envía una gran cantidad de marcos de autenticación abiertos con un número de secuencia de transacción no válido. • https://github.com/D3adP3nguin/CVE-2023-33105-Transient-DOS-in-WLAN-Host-and-Firmware https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin • CWE-16: Configuration •