ID

VAR-201811-0012


CVE

CVE-2017-18318


TITLE

Snapdragon Automobile and Snapdragon Mobile Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014333

DESCRIPTION

Missing validation check on CRL issuer name in Snapdragon Automobile, Snapdragon Mobile in versions MSM8996AU, SD 410/12, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A. Snapdragon Automobile and Snapdragon Mobile Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78244877, A-79420111, A-109677962, A-68326808, A-78240714, A-78240675, A-78241957, A-72950294, A-74235967, A-77484722, A-77484786, A-79420492, A-79420096, and A-109678529. Qualcomm MSM8996AU, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) for different platforms. An input validation vulnerability exists in Broadcast Services in several Qualcomm Snapdragon products

Trust: 2.07

sources: NVD: CVE-2017-18318 // JVNDB: JVNDB-2017-014333 // BID: 105838 // VULHUB: VHN-109428 // VULMON: CVE-2017-18318

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 810scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 410scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 412scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 810scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 105838 // JVNDB: JVNDB-2017-014333 // CNNVD: CNNVD-201811-832 // NVD: CVE-2017-18318

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18318
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-18318
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201811-832
value: CRITICAL

Trust: 0.6

VULHUB: VHN-109428
value: HIGH

Trust: 0.1

VULMON: CVE-2017-18318
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-18318
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-109428
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18318
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109428 // VULMON: CVE-2017-18318 // JVNDB: JVNDB-2017-014333 // CNNVD: CNNVD-201811-832 // NVD: CVE-2017-18318

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-109428 // JVNDB: JVNDB-2017-014333 // NVD: CVE-2017-18318

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201811-832

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201811-832

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014333

PATCH

title:November 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Fixes for product input validation vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87056

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—November 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=2a07dd9b0f590517e161812c849b67e5

Trust: 0.1

sources: VULMON: CVE-2017-18318 // JVNDB: JVNDB-2017-014333 // CNNVD: CNNVD-201811-832

EXTERNAL IDS

db:NVDid:CVE-2017-18318

Trust: 2.9

db:BIDid:105838

Trust: 1.5

db:JVNDBid:JVNDB-2017-014333

Trust: 0.8

db:CNNVDid:CNNVD-201811-832

Trust: 0.7

db:VULHUBid:VHN-109428

Trust: 0.1

db:VULMONid:CVE-2017-18318

Trust: 0.1

sources: VULHUB: VHN-109428 // VULMON: CVE-2017-18318 // BID: 105838 // JVNDB: JVNDB-2017-014333 // CNNVD: CNNVD-201811-832 // NVD: CVE-2017-18318

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:http://www.securityfocus.com/bid/105838

Trust: 1.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18318

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-18318

Trust: 0.8

url:https://source.android.com/security/bulletin/2018-11-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-109428 // VULMON: CVE-2017-18318 // BID: 105838 // JVNDB: JVNDB-2017-014333 // CNNVD: CNNVD-201811-832 // NVD: CVE-2017-18318

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 105838

SOURCES

db:VULHUBid:VHN-109428
db:VULMONid:CVE-2017-18318
db:BIDid:105838
db:JVNDBid:JVNDB-2017-014333
db:CNNVDid:CNNVD-201811-832
db:NVDid:CVE-2017-18318

LAST UPDATE DATE

2024-11-23T22:00:18.322000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109428date:2018-12-26T00:00:00
db:VULMONid:CVE-2017-18318date:2018-12-26T00:00:00
db:BIDid:105838date:2018-11-05T00:00:00
db:JVNDBid:JVNDB-2017-014333date:2019-02-05T00:00:00
db:CNNVDid:CNNVD-201811-832date:2018-11-29T00:00:00
db:NVDid:CVE-2017-18318date:2024-11-21T03:19:50.710

SOURCES RELEASE DATE

db:VULHUBid:VHN-109428date:2018-11-28T00:00:00
db:VULMONid:CVE-2017-18318date:2018-11-28T00:00:00
db:BIDid:105838date:2018-11-05T00:00:00
db:JVNDBid:JVNDB-2017-014333date:2019-02-05T00:00:00
db:CNNVDid:CNNVD-201811-832date:2018-11-29T00:00:00
db:NVDid:CVE-2017-18318date:2018-11-28T15:29:00.377