ID

VAR-201810-0533


CVE

CVE-2018-11853


TITLE

Snapdragon Mobile and Snapdragon Wear Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011515

DESCRIPTION

Lack of check on out of range for channels When processing channel list set command will lead to buffer flow in Snapdragon Mobile, Snapdragon Wear in version IPQ8074, MDM9206, MDM9607, MDM9650, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016. Snapdragon Mobile and Snapdragon Wear Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-120487384, A-117119000, A-117118976, A-117118295, A-117119172, A-122473270, A-109678120, A-111093019, A-111092813, A-111089816, A-111092945, A-111092919, A-111091938, A-111093762, A-111093242, A-111090373, A-111092814, A-111093763, A-111093243, A-111089817, A-111092400, A-111090534, A-111091378, A-111092946, A-111093022, A-111093244, A-111092888, A-111093280, A-111092401, A-111093259, A-111090535, A-112279580, A-112279127, A-119049704, A-119052960, A-114042276, A-117118499, A-117119174, A-117119152, A-117118789, A-122472377, A-120483842, A-122472139 and A-122473145. Qualcomm IPQ8074, etc. are all central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer overflow vulnerability exists in several Qualcomm Snapdragon products. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service

Trust: 2.07

sources: NVD: CVE-2018-11853 // JVNDB: JVNDB-2018-011515 // BID: 107681 // VULHUB: VHN-121754 // VULMON: CVE-2018-11853

AFFECTED PRODUCTS

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm710scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm636scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm632scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm429scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 435scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 850scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda 660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 429scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 439scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 630scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 632scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 636scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm710scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 107681 // JVNDB: JVNDB-2018-011515 // CNNVD: CNNVD-201810-1291 // NVD: CVE-2018-11853

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11853
value: HIGH

Trust: 1.0

NVD: CVE-2018-11853
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1291
value: HIGH

Trust: 0.6

VULHUB: VHN-121754
value: HIGH

Trust: 0.1

VULMON: CVE-2018-11853
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11853
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-121754
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11853
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121754 // VULMON: CVE-2018-11853 // JVNDB: JVNDB-2018-011515 // CNNVD: CNNVD-201810-1291 // NVD: CVE-2018-11853

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-121754 // JVNDB: JVNDB-2018-011515 // NVD: CVE-2018-11853

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-1291

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1291

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011515

PATCH

title:October 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86362

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—April 2019url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=cd95df8ce79ebdc8577685322caeeedf

Trust: 0.1

sources: VULMON: CVE-2018-11853 // JVNDB: JVNDB-2018-011515 // CNNVD: CNNVD-201810-1291

EXTERNAL IDS

db:NVDid:CVE-2018-11853

Trust: 2.9

db:BIDid:107681

Trust: 2.1

db:JVNDBid:JVNDB-2018-011515

Trust: 0.8

db:CNNVDid:CNNVD-201810-1291

Trust: 0.7

db:VULHUBid:VHN-121754

Trust: 0.1

db:VULMONid:CVE-2018-11853

Trust: 0.1

sources: VULHUB: VHN-121754 // VULMON: CVE-2018-11853 // BID: 107681 // JVNDB: JVNDB-2018-011515 // CNNVD: CNNVD-201810-1291 // NVD: CVE-2018-11853

REFERENCES

url:http://www.securityfocus.com/bid/107681

Trust: 2.5

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11853

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11853

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-april-2019-28925

Trust: 0.6

url:https://source.android.com/security/bulletin/2019-04-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-121754 // VULMON: CVE-2018-11853 // BID: 107681 // JVNDB: JVNDB-2018-011515 // CNNVD: CNNVD-201810-1291 // NVD: CVE-2018-11853

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 107681 // CNNVD: CNNVD-201810-1291

SOURCES

db:VULHUBid:VHN-121754
db:VULMONid:CVE-2018-11853
db:BIDid:107681
db:JVNDBid:JVNDB-2018-011515
db:CNNVDid:CNNVD-201810-1291
db:NVDid:CVE-2018-11853

LAST UPDATE DATE

2024-11-23T21:38:14.236000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121754date:2019-04-25T00:00:00
db:VULMONid:CVE-2018-11853date:2019-04-25T00:00:00
db:BIDid:107681date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-011515date:2019-01-16T00:00:00
db:CNNVDid:CNNVD-201810-1291date:2019-04-04T00:00:00
db:NVDid:CVE-2018-11853date:2024-11-21T03:44:08.177

SOURCES RELEASE DATE

db:VULHUBid:VHN-121754date:2018-10-26T00:00:00
db:VULMONid:CVE-2018-11853date:2018-10-26T00:00:00
db:BIDid:107681date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-011515date:2019-01-16T00:00:00
db:CNNVDid:CNNVD-201810-1291date:2018-10-29T00:00:00
db:NVDid:CVE-2018-11853date:2018-10-26T13:29:01.467