Description
A malformed OMACP WAP push message can cause memory corruption on a Samsung S7 Edge device when processing the String Extension portion of the WbXml payload. This is due to an integer overflow in memory allocation for this string. The Samsung ID is SVE-2018-11463.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textdosandroid
https://www.exploit-db.com/exploits/44724
References (3)
Core 3
Core References
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/44724/
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/147841/Samsung-Galaxy-S7-Edge-OMACP-WbXml-String-Extension-Processing-Overflow.html
Third Party Advisory x_refsource_confirm
https://security.samsungmobile.com/securityUpdate.smsb
Scores
CVSS v3
5.3
EPSS
0.1436
EPSS Percentile
94.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-190
Status
published
Products (5)
samsung/samsung_mobile
6.0
samsung/samsung_mobile
7.0
samsung/samsung_mobile
7.1
samsung/samsung_mobile
7.1.1
samsung/samsung_mobile
7.1.2
Published
May 29, 2018
Tracked Since
Feb 18, 2026