ID

VAR-201810-0784


CVE

CVE-2018-11821


TITLE

Snapdragon Mobile and Snapdragon Wear Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011612

DESCRIPTION

Possible integer overflow may happen in WLAN during memory allocation in Snapdragon Mobile, Snapdragon Wear in version IPQ8074, MDM9206, MDM9607, MDM9650, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 835, SD 845, SD 850, SDA660, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016. Snapdragon Mobile and Snapdragon Wear Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-120487384, A-117119000, A-117118976, A-117118295, A-117119172, A-122473270, A-109678120, A-111093019, A-111092813, A-111089816, A-111092945, A-111092919, A-111091938, A-111093762, A-111093242, A-111090373, A-111092814, A-111093763, A-111093243, A-111089817, A-111092400, A-111090534, A-111091378, A-111092946, A-111093022, A-111093244, A-111092888, A-111093280, A-111092401, A-111093259, A-111090535, A-112279580, A-112279127, A-119049704, A-119052960, A-114042276, A-117118499, A-117119174, A-117119152, A-117118789, A-122472377, A-120483842, A-122472139 and A-122473145. Qualcomm IPQ8074, etc. are all central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An integer overflow vulnerability exists in WLAN in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements

Trust: 2.07

sources: NVD: CVE-2018-11821 // JVNDB: JVNDB-2018-011612 // BID: 107681 // VULHUB: VHN-121719 // VULMON: CVE-2018-11821

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:ipq8074scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 435scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 850scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda 660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 630scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 632scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 636scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm 660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm710scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 107681 // JVNDB: JVNDB-2018-011612 // CNNVD: CNNVD-201810-1284 // NVD: CVE-2018-11821

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11821
value: HIGH

Trust: 1.0

NVD: CVE-2018-11821
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1284
value: HIGH

Trust: 0.6

VULHUB: VHN-121719
value: HIGH

Trust: 0.1

VULMON: CVE-2018-11821
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11821
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-121719
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11821
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121719 // VULMON: CVE-2018-11821 // JVNDB: JVNDB-2018-011612 // CNNVD: CNNVD-201810-1284 // NVD: CVE-2018-11821

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.9

sources: VULHUB: VHN-121719 // JVNDB: JVNDB-2018-011612 // NVD: CVE-2018-11821

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-1284

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1284

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011612

PATCH

title:October 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Product digital error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86305

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—April 2019url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=cd95df8ce79ebdc8577685322caeeedf

Trust: 0.1

sources: VULMON: CVE-2018-11821 // JVNDB: JVNDB-2018-011612 // CNNVD: CNNVD-201810-1284

EXTERNAL IDS

db:NVDid:CVE-2018-11821

Trust: 2.9

db:BIDid:107681

Trust: 2.1

db:JVNDBid:JVNDB-2018-011612

Trust: 0.8

db:CNNVDid:CNNVD-201810-1284

Trust: 0.7

db:VULHUBid:VHN-121719

Trust: 0.1

db:VULMONid:CVE-2018-11821

Trust: 0.1

sources: VULHUB: VHN-121719 // VULMON: CVE-2018-11821 // BID: 107681 // JVNDB: JVNDB-2018-011612 // CNNVD: CNNVD-201810-1284 // NVD: CVE-2018-11821

REFERENCES

url:http://www.securityfocus.com/bid/107681

Trust: 2.5

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11821

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11821

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-april-2019-28925

Trust: 0.6

url:https://source.android.com/security/bulletin/2019-04-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/190.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-121719 // VULMON: CVE-2018-11821 // BID: 107681 // JVNDB: JVNDB-2018-011612 // CNNVD: CNNVD-201810-1284 // NVD: CVE-2018-11821

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 107681 // CNNVD: CNNVD-201810-1284

SOURCES

db:VULHUBid:VHN-121719
db:VULMONid:CVE-2018-11821
db:BIDid:107681
db:JVNDBid:JVNDB-2018-011612
db:CNNVDid:CNNVD-201810-1284
db:NVDid:CVE-2018-11821

LAST UPDATE DATE

2024-11-23T21:38:13.608000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121719date:2019-04-25T00:00:00
db:VULMONid:CVE-2018-11821date:2019-04-25T00:00:00
db:BIDid:107681date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-011612date:2019-01-17T00:00:00
db:CNNVDid:CNNVD-201810-1284date:2019-04-26T00:00:00
db:NVDid:CVE-2018-11821date:2024-11-21T03:44:05.330

SOURCES RELEASE DATE

db:VULHUBid:VHN-121719date:2018-10-26T00:00:00
db:VULMONid:CVE-2018-11821date:2018-10-26T00:00:00
db:BIDid:107681date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-011612date:2019-01-17T00:00:00
db:CNNVDid:CNNVD-201810-1284date:2018-10-29T00:00:00
db:NVDid:CVE-2018-11821date:2018-10-26T13:29:00.840