ID

VAR-201803-1016


CVE

CVE-2017-14912


TITLE

plural Qualcomm Run on product Android Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-013121

DESCRIPTION

In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile [VERSION]: MDM9206, MDM9607, MDM9650, MSM8909W, SD 200, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 835, the attributes of buffers in Secure Display were not marked properly. plural Qualcomm Run on product Android Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to multiple unspecified security vulnerabilities. Little is known about these issues or its effects at this time. We will update this BID as more information emerges. These issues are being tracked by Android Bug IDs A-62212946, A-32584150, A-62212739, A-62212298, A-62212632, A-65944893 and A-66913721. Android is a Linux-based open source operating system developed by Google and the Open Handheld Alliance (OHA). There is a buffer error vulnerability in Android versions before 2018-01-05. The vulnerability stems from the fact that the program does not correctly mark the buffer attribute in Secure Display. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements

Trust: 2.07

sources: NVD: CVE-2017-14912 // JVNDB: JVNDB-2017-013121 // BID: 102386 // VULHUB: VHN-105682 // VULMON: CVE-2017-14912

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 800scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 400scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 617scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 400scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 410scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 412scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 415scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 615scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 616scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 617scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 800scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:20

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:20

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:7

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:4

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:10

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 102386 // JVNDB: JVNDB-2017-013121 // CNNVD: CNNVD-201709-1244 // NVD: CVE-2017-14912

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14912
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-14912
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201709-1244
value: CRITICAL

Trust: 0.6

VULHUB: VHN-105682
value: HIGH

Trust: 0.1

VULMON: CVE-2017-14912
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14912
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-105682
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14912
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-105682 // VULMON: CVE-2017-14912 // JVNDB: JVNDB-2017-013121 // CNNVD: CNNVD-201709-1244 // NVD: CVE-2017-14912

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-105682 // JVNDB: JVNDB-2017-013121 // NVD: CVE-2017-14912

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1244

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201709-1244

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013121

PATCH

title:Android のセキュリティに関する公開情報 - 2018 年 1 月url:https://source.android.com/security/bulletin/2018-01-01

Trust: 0.8

title:Android Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123390

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—January 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=ff88b75bf1ceb456c3338ab1aa0a6db7

Trust: 0.1

sources: VULMON: CVE-2017-14912 // JVNDB: JVNDB-2017-013121 // CNNVD: CNNVD-201709-1244

EXTERNAL IDS

db:NVDid:CVE-2017-14912

Trust: 2.9

db:BIDid:102386

Trust: 2.1

db:SECTRACKid:1040106

Trust: 1.8

db:JVNDBid:JVNDB-2017-013121

Trust: 0.8

db:CNNVDid:CNNVD-201709-1244

Trust: 0.7

db:NSFOCUSid:38624

Trust: 0.6

db:VULHUBid:VHN-105682

Trust: 0.1

db:VULMONid:CVE-2017-14912

Trust: 0.1

sources: VULHUB: VHN-105682 // VULMON: CVE-2017-14912 // BID: 102386 // JVNDB: JVNDB-2017-013121 // CNNVD: CNNVD-201709-1244 // NVD: CVE-2017-14912

REFERENCES

url:https://source.android.com/security/bulletin/2018-01-01

Trust: 2.1

url:http://www.securityfocus.com/bid/102386

Trust: 1.9

url:http://www.securitytracker.com/id/1040106

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14912

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14912

Trust: 0.8

url:http://www.nsfocus.net/vulndb/38624

Trust: 0.6

url:http://code.google.com/android/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-01-01.html

Trust: 0.1

sources: VULHUB: VHN-105682 // VULMON: CVE-2017-14912 // BID: 102386 // JVNDB: JVNDB-2017-013121 // CNNVD: CNNVD-201709-1244 // NVD: CVE-2017-14912

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 102386

SOURCES

db:VULHUBid:VHN-105682
db:VULMONid:CVE-2017-14912
db:BIDid:102386
db:JVNDBid:JVNDB-2017-013121
db:CNNVDid:CNNVD-201709-1244
db:NVDid:CVE-2017-14912

LAST UPDATE DATE

2024-11-23T20:59:38.379000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-105682date:2018-04-27T00:00:00
db:VULMONid:CVE-2017-14912date:2018-04-27T00:00:00
db:BIDid:102386date:2018-01-02T00:00:00
db:JVNDBid:JVNDB-2017-013121date:2018-05-28T00:00:00
db:CNNVDid:CNNVD-201709-1244date:2020-07-10T00:00:00
db:NVDid:CVE-2017-14912date:2024-11-21T03:13:44.710

SOURCES RELEASE DATE

db:VULHUBid:VHN-105682date:2018-03-30T00:00:00
db:VULMONid:CVE-2017-14912date:2018-03-30T00:00:00
db:BIDid:102386date:2018-01-02T00:00:00
db:JVNDBid:JVNDB-2017-013121date:2018-05-28T00:00:00
db:CNNVDid:CNNVD-201709-1244date:2017-09-29T00:00:00
db:NVDid:CVE-2017-14912date:2018-03-30T15:29:00.493