ID

VAR-201807-1820


CVE

CVE-2018-5891


TITLE

Snapdragon Mobile and Snapdragon Wear Vulnerabilities in use of freed memory

Trust: 0.8

sources: JVNDB: JVNDB-2018-007675

DESCRIPTION

While processing modem SSR after IMS is registered, the IMS data daemon is restarted but the ipc_dataHandle is no longer available. Consequently, the DPL thread frees the internal memory for dataDHandle but the local variable pointer is not updated which can lead to a Use After Free condition in Snapdragon Mobile and Snapdragon Wear. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm MSM8996AU is a central processing unit (CPU) product of Qualcomm (Qualcomm). A resource management error vulnerability exists in Data Network Stack & Connectivity in several Qualcomm products. A local attacker could exploit this vulnerability with a specially crafted file to cause a system crash (denial of service). The following products and versions are affected: Qualcomm MSM8909W; MSM8996AU; SD 210; SD 212; SD 205; SD 450; SD 615/16; SD 415; SD 625; SD 650/52;

Trust: 2.07

sources: NVD: CVE-2018-5891 // JVNDB: JVNDB-2018-007675 // BID: 104759 // VULHUB: VHN-135923 // VULMON: CVE-2018-5891

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 415scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 615scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 616scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 104759 // JVNDB: JVNDB-2018-007675 // CNNVD: CNNVD-201807-397 // NVD: CVE-2018-5891

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5891
value: HIGH

Trust: 1.0

NVD: CVE-2018-5891
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201807-397
value: MEDIUM

Trust: 0.6

VULHUB: VHN-135923
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-5891
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-5891
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-135923
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5891
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.5
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-135923 // VULMON: CVE-2018-5891 // JVNDB: JVNDB-2018-007675 // CNNVD: CNNVD-201807-397 // NVD: CVE-2018-5891

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.9

sources: VULHUB: VHN-135923 // JVNDB: JVNDB-2018-007675 // NVD: CVE-2018-5891

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201807-397

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201807-397

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007675

PATCH

title:July 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Qualcomm Snapdragon Mobile and Snapdragon Wear Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81818

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—June 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=cc496c56e2bf669809bfb568f59af8e1

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

sources: VULMON: CVE-2018-5891 // JVNDB: JVNDB-2018-007675 // CNNVD: CNNVD-201807-397

EXTERNAL IDS

db:NVDid:CVE-2018-5891

Trust: 2.9

db:JVNDBid:JVNDB-2018-007675

Trust: 0.8

db:CNNVDid:CNNVD-201807-397

Trust: 0.7

db:BIDid:104759

Trust: 0.3

db:VULHUBid:VHN-135923

Trust: 0.1

db:VULMONid:CVE-2018-5891

Trust: 0.1

sources: VULHUB: VHN-135923 // VULMON: CVE-2018-5891 // BID: 104759 // JVNDB: JVNDB-2018-007675 // CNNVD: CNNVD-201807-397 // NVD: CVE-2018-5891

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5891

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5891

Trust: 0.8

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://source.android.com/security/bulletin/2018-06-01

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-06-01.html

Trust: 0.1

url:https://github.com/samreleasenotes/samsungreleasenotes

Trust: 0.1

sources: VULHUB: VHN-135923 // VULMON: CVE-2018-5891 // BID: 104759 // JVNDB: JVNDB-2018-007675 // CNNVD: CNNVD-201807-397 // NVD: CVE-2018-5891

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 104759

SOURCES

db:VULHUBid:VHN-135923
db:VULMONid:CVE-2018-5891
db:BIDid:104759
db:JVNDBid:JVNDB-2018-007675
db:CNNVDid:CNNVD-201807-397
db:NVDid:CVE-2018-5891

LAST UPDATE DATE

2024-11-23T22:06:40.174000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-135923date:2018-09-04T00:00:00
db:VULMONid:CVE-2018-5891date:2018-09-04T00:00:00
db:BIDid:104759date:2018-06-06T00:00:00
db:JVNDBid:JVNDB-2018-007675date:2018-09-21T00:00:00
db:CNNVDid:CNNVD-201807-397date:2020-07-27T00:00:00
db:NVDid:CVE-2018-5891date:2024-11-21T04:09:39.020

SOURCES RELEASE DATE

db:VULHUBid:VHN-135923date:2018-07-06T00:00:00
db:VULMONid:CVE-2018-5891date:2018-07-06T00:00:00
db:BIDid:104759date:2018-06-06T00:00:00
db:JVNDBid:JVNDB-2018-007675date:2018-09-21T00:00:00
db:CNNVDid:CNNVD-201807-397date:2018-07-06T00:00:00
db:NVDid:CVE-2018-5891date:2018-07-06T17:29:02.087