ID

VAR-201902-0574


CVE

CVE-2018-13888


TITLE

plural Snapdragon Product buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-013677

DESCRIPTION

There is potential for memory corruption in the RIL daemon due to de reference of memory outside the allocated array length in RIL in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in versions MDM9206, MDM9607, MDM9635M, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDM630, SDM660, ZZ_QCS605. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-111092812, A-111093241 and A-117119136. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer overflow vulnerability exists in the RIL in several Qualcomm products. A remote attacker could exploit this vulnerability to cause memory corruption in the RIL daemon

Trust: 2.07

sources: NVD: CVE-2018-13888 // JVNDB: JVNDB-2018-013677 // BID: 106475 // VULHUB: VHN-123992 // VULMON: CVE-2018-13888

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:zz qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9635mscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9635mscope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 106475 // JVNDB: JVNDB-2018-013677 // NVD: CVE-2018-13888

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-13888
value: HIGH

Trust: 1.0

NVD: CVE-2018-13888
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201901-183
value: HIGH

Trust: 0.6

VULHUB: VHN-123992
value: HIGH

Trust: 0.1

VULMON: CVE-2018-13888
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-13888
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-123992
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-13888
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-123992 // VULMON: CVE-2018-13888 // JVNDB: JVNDB-2018-013677 // CNNVD: CNNVD-201901-183 // NVD: CVE-2018-13888

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-123992 // JVNDB: JVNDB-2018-013677 // NVD: CVE-2018-13888

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-183

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201901-183

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013677

PATCH

title:January 2019 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-13888

Trust: 0.8

title:Multiple Qualcomm Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88370

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—January 2019url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=6f7705599658e12e11baf07588cec356

Trust: 0.1

sources: VULMON: CVE-2018-13888 // JVNDB: JVNDB-2018-013677 // CNNVD: CNNVD-201901-183

EXTERNAL IDS

db:NVDid:CVE-2018-13888

Trust: 2.9

db:BIDid:106475

Trust: 2.1

db:JVNDBid:JVNDB-2018-013677

Trust: 0.8

db:CNNVDid:CNNVD-201901-183

Trust: 0.7

db:VULHUBid:VHN-123992

Trust: 0.1

db:VULMONid:CVE-2018-13888

Trust: 0.1

sources: VULHUB: VHN-123992 // VULMON: CVE-2018-13888 // BID: 106475 // JVNDB: JVNDB-2018-013677 // CNNVD: CNNVD-201901-183 // NVD: CVE-2018-13888

REFERENCES

url:http://www.securityfocus.com/bid/106475

Trust: 2.4

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-13888

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13888

Trust: 0.8

url:https://source.android.com/security/bulletin/2019-01-01

Trust: 0.6

url:https://source.android.com/security/bulletin/2019-01-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-123992 // VULMON: CVE-2018-13888 // BID: 106475 // JVNDB: JVNDB-2018-013677 // CNNVD: CNNVD-201901-183 // NVD: CVE-2018-13888

CREDITS

.

Trust: 0.6

sources: CNNVD: CNNVD-201901-183

SOURCES

db:VULHUBid:VHN-123992
db:VULMONid:CVE-2018-13888
db:BIDid:106475
db:JVNDBid:JVNDB-2018-013677
db:CNNVDid:CNNVD-201901-183
db:NVDid:CVE-2018-13888

LAST UPDATE DATE

2024-11-23T21:37:38.881000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-123992date:2019-02-14T00:00:00
db:VULMONid:CVE-2018-13888date:2019-02-14T00:00:00
db:BIDid:106475date:2019-01-07T00:00:00
db:JVNDBid:JVNDB-2018-013677date:2019-02-28T00:00:00
db:CNNVDid:CNNVD-201901-183date:2020-01-08T00:00:00
db:NVDid:CVE-2018-13888date:2024-11-21T03:48:15.573

SOURCES RELEASE DATE

db:VULHUBid:VHN-123992date:2019-02-11T00:00:00
db:VULMONid:CVE-2018-13888date:2019-02-11T00:00:00
db:BIDid:106475date:2019-01-07T00:00:00
db:JVNDBid:JVNDB-2018-013677date:2019-02-28T00:00:00
db:CNNVDid:CNNVD-201901-183date:2019-01-09T00:00:00
db:NVDid:CVE-2018-13888date:2019-02-11T15:29:00.740