ID

VAR-201804-0160


CVE

CVE-2016-10495


TITLE

Qualcomm Snapdragon Mobile Run on Android Vulnerabilities related to range errors

Trust: 0.8

sources: JVNDB: JVNDB-2018-003591

DESCRIPTION

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9635M, made changes to map the scan type value to an index value that is in range. Qualcomm Snapdragon Mobile Run on Android Contains a range error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to multiple unspecified security vulnerabilities. Little is known about these issues or its effects at this time. We will update this BID as more information emerges. Android is a Linux-based open source operating system jointly developed by Google and the Open Handheld Alliance (OHA). Qualcomm MDM9635M is a central processing unit (CPU) product of Qualcomm (Qualcomm). A remote attacker could exploit this vulnerability to gain access. The following product (used in mobile devices) is affected: Qualcomm MDM9635M

Trust: 2.07

sources: NVD: CVE-2016-10495 // JVNDB: JVNDB-2018-003591 // BID: 103671 // VULHUB: VHN-89277 // VULMON: CVE-2016-10495

AFFECTED PRODUCTS

vendor:qualcommmodel:mdm9635mscope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9635mscope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:20

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:20

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:7

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:4

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:10

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 103671 // JVNDB: JVNDB-2018-003591 // CNNVD: CNNVD-201804-849 // NVD: CVE-2016-10495

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-10495
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-10495
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201804-849
value: CRITICAL

Trust: 0.6

VULHUB: VHN-89277
value: HIGH

Trust: 0.1

VULMON: CVE-2016-10495
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-10495
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-89277
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-10495
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-89277 // VULMON: CVE-2016-10495 // JVNDB: JVNDB-2018-003591 // CNNVD: CNNVD-201804-849 // NVD: CVE-2016-10495

PROBLEMTYPE DATA

problemtype:CWE-118

Trust: 1.9

sources: VULHUB: VHN-89277 // JVNDB: JVNDB-2018-003591 // NVD: CVE-2016-10495

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-849

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201804-849

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003591

PATCH

title:Android のセキュリティに関する公開情報 - 2018 年 4 月url:https://source.android.com/security/bulletin/2018-04-01

Trust: 0.8

title:Qualcomm Snapdragonurl:https://www.qualcomm.co.jp/snapdragon

Trust: 0.8

title:Android Qualcomm Repair measures for closed source component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80205

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—April 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=068d787c35ce8cea494780f9a47b5827

Trust: 0.1

sources: VULMON: CVE-2016-10495 // JVNDB: JVNDB-2018-003591 // CNNVD: CNNVD-201804-849

EXTERNAL IDS

db:NVDid:CVE-2016-10495

Trust: 2.9

db:BIDid:103671

Trust: 1.5

db:JVNDBid:JVNDB-2018-003591

Trust: 0.8

db:CNNVDid:CNNVD-201804-849

Trust: 0.6

db:VULHUBid:VHN-89277

Trust: 0.1

db:VULMONid:CVE-2016-10495

Trust: 0.1

sources: VULHUB: VHN-89277 // VULMON: CVE-2016-10495 // BID: 103671 // JVNDB: JVNDB-2018-003591 // CNNVD: CNNVD-201804-849 // NVD: CVE-2016-10495

REFERENCES

url:https://source.android.com/security/bulletin/2018-04-01

Trust: 2.1

url:http://www.securityfocus.com/bid/103671

Trust: 1.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10495

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-10495

Trust: 0.8

url:http://code.google.com/android/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/118.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-04-01.html

Trust: 0.1

sources: VULHUB: VHN-89277 // VULMON: CVE-2016-10495 // BID: 103671 // JVNDB: JVNDB-2018-003591 // CNNVD: CNNVD-201804-849 // NVD: CVE-2016-10495

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 103671

SOURCES

db:VULHUBid:VHN-89277
db:VULMONid:CVE-2016-10495
db:BIDid:103671
db:JVNDBid:JVNDB-2018-003591
db:CNNVDid:CNNVD-201804-849
db:NVDid:CVE-2016-10495

LAST UPDATE DATE

2024-11-23T21:39:22.840000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-89277date:2018-04-24T00:00:00
db:VULMONid:CVE-2016-10495date:2018-04-24T00:00:00
db:BIDid:103671date:2018-04-05T00:00:00
db:JVNDBid:JVNDB-2018-003591date:2018-05-29T00:00:00
db:CNNVDid:CNNVD-201804-849date:2018-05-18T00:00:00
db:NVDid:CVE-2016-10495date:2024-11-21T02:44:08.160

SOURCES RELEASE DATE

db:VULHUBid:VHN-89277date:2018-04-18T00:00:00
db:VULMONid:CVE-2016-10495date:2018-04-18T00:00:00
db:BIDid:103671date:2018-04-05T00:00:00
db:JVNDBid:JVNDB-2018-003591date:2018-05-29T00:00:00
db:CNNVDid:CNNVD-201804-849date:2018-04-18T00:00:00
db:NVDid:CVE-2016-10495date:2018-04-18T14:29:13.980