ID

VAR-201803-1017


CVE

CVE-2017-14913


TITLE

plural Qualcomm Run on product Android Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-013117

DESCRIPTION

In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile MDM9206, SD 625, SD 650/52, SD 835, SD 845, DDR address input validation is being improperly truncated. plural Qualcomm Run on product Android Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to multiple unspecified security vulnerabilities. Little is known about these issues or its effects at this time. We will update this BID as more information emerges. These issues are being tracked by Android Bug IDs A-62212946, A-32584150, A-62212739, A-62212298, A-62212632, A-65944893 and A-66913721. Android is a Linux-based open source operating system developed by Google and the Open Handheld Alliance (OHA). An input validation error vulnerability exists in Android versions prior to 2018-01-05. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Qualcomm MDM9206; SD 625; SD 650/52; SD 835; SD 845

Trust: 2.07

sources: NVD: CVE-2017-14913 // JVNDB: JVNDB-2017-013117 // BID: 102386 // VULHUB: VHN-105683 // VULMON: CVE-2017-14913

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:20

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:20

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:7

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:4

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:10

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 102386 // JVNDB: JVNDB-2017-013117 // CNNVD: CNNVD-201709-1243 // NVD: CVE-2017-14913

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14913
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-14913
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201709-1243
value: CRITICAL

Trust: 0.6

VULHUB: VHN-105683
value: HIGH

Trust: 0.1

VULMON: CVE-2017-14913
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14913
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-105683
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14913
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-105683 // VULMON: CVE-2017-14913 // JVNDB: JVNDB-2017-013117 // CNNVD: CNNVD-201709-1243 // NVD: CVE-2017-14913

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-105683 // JVNDB: JVNDB-2017-013117 // NVD: CVE-2017-14913

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1243

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201709-1243

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013117

PATCH

title:Android のセキュリティに関する公開情報 - 2018 年 1 月url:https://source.android.com/security/bulletin/2018-01-01

Trust: 0.8

title:Top Pageurl:https://www.qualcomm.com/

Trust: 0.8

title:Android Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123389

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—January 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=ff88b75bf1ceb456c3338ab1aa0a6db7

Trust: 0.1

sources: VULMON: CVE-2017-14913 // JVNDB: JVNDB-2017-013117 // CNNVD: CNNVD-201709-1243

EXTERNAL IDS

db:NVDid:CVE-2017-14913

Trust: 2.9

db:BIDid:102386

Trust: 2.1

db:SECTRACKid:1040106

Trust: 1.8

db:JVNDBid:JVNDB-2017-013117

Trust: 0.8

db:CNNVDid:CNNVD-201709-1243

Trust: 0.7

db:NSFOCUSid:38624

Trust: 0.6

db:VULHUBid:VHN-105683

Trust: 0.1

db:VULMONid:CVE-2017-14913

Trust: 0.1

sources: VULHUB: VHN-105683 // VULMON: CVE-2017-14913 // BID: 102386 // JVNDB: JVNDB-2017-013117 // CNNVD: CNNVD-201709-1243 // NVD: CVE-2017-14913

REFERENCES

url:https://source.android.com/security/bulletin/2018-01-01

Trust: 2.1

url:http://www.securityfocus.com/bid/102386

Trust: 1.9

url:http://www.securitytracker.com/id/1040106

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14913

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14913

Trust: 0.8

url:http://www.nsfocus.net/vulndb/38624

Trust: 0.6

url:http://code.google.com/android/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-01-01.html

Trust: 0.1

sources: VULHUB: VHN-105683 // VULMON: CVE-2017-14913 // BID: 102386 // JVNDB: JVNDB-2017-013117 // CNNVD: CNNVD-201709-1243 // NVD: CVE-2017-14913

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 102386

SOURCES

db:VULHUBid:VHN-105683
db:VULMONid:CVE-2017-14913
db:BIDid:102386
db:JVNDBid:JVNDB-2017-013117
db:CNNVDid:CNNVD-201709-1243
db:NVDid:CVE-2017-14913

LAST UPDATE DATE

2024-11-23T21:24:22.438000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-105683date:2018-04-27T00:00:00
db:VULMONid:CVE-2017-14913date:2018-04-27T00:00:00
db:BIDid:102386date:2018-01-02T00:00:00
db:JVNDBid:JVNDB-2017-013117date:2018-05-28T00:00:00
db:CNNVDid:CNNVD-201709-1243date:2020-07-10T00:00:00
db:NVDid:CVE-2017-14913date:2024-11-21T03:13:44.847

SOURCES RELEASE DATE

db:VULHUBid:VHN-105683date:2018-03-30T00:00:00
db:VULMONid:CVE-2017-14913date:2018-03-30T00:00:00
db:BIDid:102386date:2018-01-02T00:00:00
db:JVNDBid:JVNDB-2017-013117date:2018-05-28T00:00:00
db:CNNVDid:CNNVD-201709-1243date:2017-09-29T00:00:00
db:NVDid:CVE-2017-14913date:2018-03-30T15:29:00.557