ID

VAR-201810-0058


CVE

CVE-2017-18294


TITLE

plural Snapdragon Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2017-014302

DESCRIPTION

While reading file class type from ELF header, a buffer overread may happen if the ELF file size is less than the size of ELF64 header size in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version FSM9055, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDA660, SDX20. Snapdragon Automobile , Snapdragon Mobile , Snapdragon Wear Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm FSM9055, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An input validation vulnerability exists in several Qualcomm Snapdragon products. An attacker can exploit this vulnerability to cause a buffer out-of-bounds read

Trust: 1.8

sources: NVD: CVE-2017-18294 // JVNDB: JVNDB-2017-014302 // VULHUB: VHN-109402 // VULMON: CVE-2017-18294

AFFECTED PRODUCTS

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:fsm9055scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:fsm9055scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 415scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 615scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 616scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda 660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdx20scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-014302 // CNNVD: CNNVD-201810-1155 // NVD: CVE-2017-18294

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18294
value: HIGH

Trust: 1.0

NVD: CVE-2017-18294
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1155
value: HIGH

Trust: 0.6

VULHUB: VHN-109402
value: HIGH

Trust: 0.1

VULMON: CVE-2017-18294
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-18294
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-109402
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18294
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109402 // VULMON: CVE-2017-18294 // JVNDB: JVNDB-2017-014302 // CNNVD: CNNVD-201810-1155 // NVD: CVE-2017-18294

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-109402 // JVNDB: JVNDB-2017-014302 // NVD: CVE-2017-18294

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-1155

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1155

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014302

PATCH

title:October 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Fixes for product input validation vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86253

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—August 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=746dc14fcd3f5e139648cfdc9d9039a9

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

sources: VULMON: CVE-2017-18294 // JVNDB: JVNDB-2017-014302 // CNNVD: CNNVD-201810-1155

EXTERNAL IDS

db:NVDid:CVE-2017-18294

Trust: 2.6

db:SECTRACKid:1041432

Trust: 1.8

db:JVNDBid:JVNDB-2017-014302

Trust: 0.8

db:CNNVDid:CNNVD-201810-1155

Trust: 0.7

db:VULHUBid:VHN-109402

Trust: 0.1

db:VULMONid:CVE-2017-18294

Trust: 0.1

sources: VULHUB: VHN-109402 // VULMON: CVE-2017-18294 // JVNDB: JVNDB-2017-014302 // CNNVD: CNNVD-201810-1155 // NVD: CVE-2017-18294

REFERENCES

url:https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components

Trust: 1.8

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:http://www.securitytracker.com/id/1041432

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18294

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-18294

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-08-01.html

Trust: 0.1

url:https://github.com/samreleasenotes/samsungreleasenotes

Trust: 0.1

sources: VULHUB: VHN-109402 // VULMON: CVE-2017-18294 // JVNDB: JVNDB-2017-014302 // CNNVD: CNNVD-201810-1155 // NVD: CVE-2017-18294

SOURCES

db:VULHUBid:VHN-109402
db:VULMONid:CVE-2017-18294
db:JVNDBid:JVNDB-2017-014302
db:CNNVDid:CNNVD-201810-1155
db:NVDid:CVE-2017-18294

LAST UPDATE DATE

2024-11-23T20:19:29.168000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109402date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-18294date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-014302date:2019-01-11T00:00:00
db:CNNVDid:CNNVD-201810-1155date:2019-10-23T00:00:00
db:NVDid:CVE-2017-18294date:2024-11-21T03:19:47.590

SOURCES RELEASE DATE

db:VULHUBid:VHN-109402date:2018-10-23T00:00:00
db:VULMONid:CVE-2017-18294date:2018-10-23T00:00:00
db:JVNDBid:JVNDB-2017-014302date:2019-01-11T00:00:00
db:CNNVDid:CNNVD-201810-1155date:2018-10-24T00:00:00
db:NVDid:CVE-2017-18294date:2018-10-23T13:29:01.400