ID

VAR-201905-0759


CVE

CVE-2018-11928


TITLE

plural Snapdragon Buffer error vulnerability in product

Trust: 0.8

sources: JVNDB: JVNDB-2018-015532

DESCRIPTION

Lack of check on length parameter may cause buffer overflow while processing WMI commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCS605, SD 210/SD 212/SD 205, SD 425, SD 600, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150, SXR1130. plural Snapdragon The product contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-120487384, A-117119000, A-117118976, A-117118295, A-117119172, A-122473270, A-109678120, A-111093019, A-111092813, A-111089816, A-111092945, A-111092919, A-111091938, A-111093762, A-111093242, A-111090373, A-111092814, A-111093763, A-111093243, A-111089817, A-111092400, A-111090534, A-111091378, A-111092946, A-111093022, A-111093244, A-111092888, A-111093280, A-111092401, A-111093259, A-111090535, A-112279580, A-112279127, A-119049704, A-119052960, A-114042276, A-117118499, A-117119174, A-117119152, A-117118789, A-122472377, A-120483842, A-122472139 and A-122473145. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. MDM9640 is a central processing unit (CPU) product. A buffer error vulnerability exists in several Qualcomm products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: Qualcomm IPQ8074 ; MDM9206 ; MDM9607 ; MDM9640 ; MDM9650 ; MSM8996AU ; QCA6174A ; QCA6564 ; QCA6574 ; QCA6574AU ; QCA6584 ; QCA6584AU ; QCA8081 ; QCA9377 ; QCA9379 ; QCA9886 ; QCS605 ; SD 210 ; SD 212 ; SD 205 SD 425; SD 600; SD 625; SD 636; SD 675; SD 712; SD 710; SD 670; SD 820; SD 820A; SD 835; SD 845; SD 850; SD 855; SDM660; SDX20; SDX24; SM7150; SXR1130

Trust: 2.07

sources: NVD: CVE-2018-11928 // JVNDB: JVNDB-2018-015532 // BID: 107681 // VULHUB: VHN-121836 // VULMON: CVE-2018-11928

AFFECTED PRODUCTS

vendor:qualcommmodel:qca9379scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6584auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca9377scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca8081scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sxr1130scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6564scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 8cxscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm7150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca9886scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6574auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6174ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 600scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6584scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6574scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9640scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6174ascope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6564scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6574scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6574auscope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 107681 // JVNDB: JVNDB-2018-015532 // NVD: CVE-2018-11928

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11928
value: HIGH

Trust: 1.0

NVD: CVE-2018-11928
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201904-113
value: HIGH

Trust: 0.6

VULHUB: VHN-121836
value: HIGH

Trust: 0.1

VULMON: CVE-2018-11928
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11928
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-121836
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11928
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121836 // VULMON: CVE-2018-11928 // JVNDB: JVNDB-2018-015532 // CNNVD: CNNVD-201904-113 // NVD: CVE-2018-11928

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-121836 // JVNDB: JVNDB-2018-015532 // NVD: CVE-2018-11928

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201904-113

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201904-113

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015532

PATCH

title:April 2019 Code Aurora Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-11928

Trust: 0.8

title:Android Fixes for other vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91032

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—April 2019url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=cd95df8ce79ebdc8577685322caeeedf

Trust: 0.1

sources: VULMON: CVE-2018-11928 // JVNDB: JVNDB-2018-015532 // CNNVD: CNNVD-201904-113

EXTERNAL IDS

db:NVDid:CVE-2018-11928

Trust: 2.9

db:BIDid:107681

Trust: 1.0

db:JVNDBid:JVNDB-2018-015532

Trust: 0.8

db:CNNVDid:CNNVD-201904-113

Trust: 0.7

db:VULHUBid:VHN-121836

Trust: 0.1

db:VULMONid:CVE-2018-11928

Trust: 0.1

sources: VULHUB: VHN-121836 // VULMON: CVE-2018-11928 // BID: 107681 // JVNDB: JVNDB-2018-015532 // CNNVD: CNNVD-201904-113 // NVD: CVE-2018-11928

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins#_cve-2018-11928

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11928

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11928

Trust: 0.8

url:http://www.securityfocus.com/bid/107681

Trust: 0.7

url:https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-april-2019-28925

Trust: 0.6

url:https://source.android.com/security/bulletin/2019-04-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-121836 // VULMON: CVE-2018-11928 // BID: 107681 // JVNDB: JVNDB-2018-015532 // CNNVD: CNNVD-201904-113 // NVD: CVE-2018-11928

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 107681 // CNNVD: CNNVD-201904-113

SOURCES

db:VULHUBid:VHN-121836
db:VULMONid:CVE-2018-11928
db:BIDid:107681
db:JVNDBid:JVNDB-2018-015532
db:CNNVDid:CNNVD-201904-113
db:NVDid:CVE-2018-11928

LAST UPDATE DATE

2024-11-23T21:38:14.552000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121836date:2019-05-29T00:00:00
db:VULMONid:CVE-2018-11928date:2019-05-29T00:00:00
db:BIDid:107681date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-015532date:2019-06-11T00:00:00
db:CNNVDid:CNNVD-201904-113date:2019-05-30T00:00:00
db:NVDid:CVE-2018-11928date:2024-11-21T03:44:16.090

SOURCES RELEASE DATE

db:VULHUBid:VHN-121836date:2019-05-24T00:00:00
db:VULMONid:CVE-2018-11928date:2019-05-24T00:00:00
db:BIDid:107681date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-015532date:2019-06-11T00:00:00
db:CNNVDid:CNNVD-201904-113date:2019-04-02T00:00:00
db:NVDid:CVE-2018-11928date:2019-05-24T17:29:01.320