ID

VAR-201811-0315


CVE

CVE-2018-11264


TITLE

plural Snapdragon Product buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-012584

DESCRIPTION

Possible buffer overflow in Ontario fingerprint code due to lack of input validation for the parameters coming into TZ from HLOS in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDA660. Snapdragon Automobile , Snapdragon Mobile , Snapdragon Wear Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78244877, A-79420111, A-109677962, A-68326808, A-78240714, A-78240675, A-78241957, A-72950294, A-74235967, A-77484722, A-77484786, A-79420492, A-79420096, and A-109678529. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer overflow vulnerability exists in the Ontario fingerprint code in several Qualcomm Snapdragon products. The vulnerability is caused by the program not performing input detection on parameters

Trust: 2.07

sources: NVD: CVE-2018-11264 // JVNDB: JVNDB-2018-012584 // BID: 105838 // VULHUB: VHN-121106 // VULMON: CVE-2018-11264

AFFECTED PRODUCTS

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 410scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 412scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda 660scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 105838 // JVNDB: JVNDB-2018-012584 // CNNVD: CNNVD-201811-833 // NVD: CVE-2018-11264

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11264
value: HIGH

Trust: 1.0

NVD: CVE-2018-11264
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201811-833
value: HIGH

Trust: 0.6

VULHUB: VHN-121106
value: HIGH

Trust: 0.1

VULMON: CVE-2018-11264
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11264
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-121106
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11264
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121106 // VULMON: CVE-2018-11264 // JVNDB: JVNDB-2018-012584 // CNNVD: CNNVD-201811-833 // NVD: CVE-2018-11264

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-121106 // JVNDB: JVNDB-2018-012584 // NVD: CVE-2018-11264

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201811-833

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201811-833

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-012584

PATCH

title:November 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87057

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—November 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=2a07dd9b0f590517e161812c849b67e5

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/november-android-security-update-fixes-critical-bugs-drops-media-library/

Trust: 0.1

sources: VULMON: CVE-2018-11264 // JVNDB: JVNDB-2018-012584 // CNNVD: CNNVD-201811-833

EXTERNAL IDS

db:NVDid:CVE-2018-11264

Trust: 2.9

db:BIDid:105838

Trust: 1.5

db:JVNDBid:JVNDB-2018-012584

Trust: 0.8

db:CNNVDid:CNNVD-201811-833

Trust: 0.7

db:VULHUBid:VHN-121106

Trust: 0.1

db:VULMONid:CVE-2018-11264

Trust: 0.1

sources: VULHUB: VHN-121106 // VULMON: CVE-2018-11264 // BID: 105838 // JVNDB: JVNDB-2018-012584 // CNNVD: CNNVD-201811-833 // NVD: CVE-2018-11264

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:http://www.securityfocus.com/bid/105838

Trust: 1.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11264

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11264

Trust: 0.8

url:https://source.android.com/security/bulletin/2018-11-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.bleepingcomputer.com/news/security/november-android-security-update-fixes-critical-bugs-drops-media-library/

Trust: 0.1

sources: VULHUB: VHN-121106 // VULMON: CVE-2018-11264 // BID: 105838 // JVNDB: JVNDB-2018-012584 // CNNVD: CNNVD-201811-833 // NVD: CVE-2018-11264

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 105838

SOURCES

db:VULHUBid:VHN-121106
db:VULMONid:CVE-2018-11264
db:BIDid:105838
db:JVNDBid:JVNDB-2018-012584
db:CNNVDid:CNNVD-201811-833
db:NVDid:CVE-2018-11264

LAST UPDATE DATE

2024-11-23T22:00:18.157000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121106date:2018-12-26T00:00:00
db:VULMONid:CVE-2018-11264date:2018-12-26T00:00:00
db:BIDid:105838date:2018-11-05T00:00:00
db:JVNDBid:JVNDB-2018-012584date:2019-02-05T00:00:00
db:CNNVDid:CNNVD-201811-833date:2018-11-29T00:00:00
db:NVDid:CVE-2018-11264date:2024-11-21T03:43:01.110

SOURCES RELEASE DATE

db:VULHUBid:VHN-121106date:2018-11-28T00:00:00
db:VULMONid:CVE-2018-11264date:2018-11-28T00:00:00
db:BIDid:105838date:2018-11-05T00:00:00
db:JVNDBid:JVNDB-2018-012584date:2019-02-05T00:00:00
db:CNNVDid:CNNVD-201811-833date:2018-11-29T00:00:00
db:NVDid:CVE-2018-11264date:2018-11-28T15:29:00.423