ID

VAR-201906-0735


CVE

CVE-2018-13919


TITLE

plural Snapdragon Vulnerability in using freed memory in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015633

DESCRIPTION

Use-after-free vulnerability will occur if reset of the routing table encounters an invalid rule id while processing command to reset in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, QCS405, QCS605, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause a denial-of-service condition. These issues are being tracked by Android Bug IDs A-78528839, A-120486022. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. MDM9650 is a central processing unit (CPU) product. A resource management error vulnerability exists in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Qualcomm MDM9150; MDM9206; MDM9607; MDM9650; MSM8909W; QCS405; QCS605; SD 625; 835; SD 845; SD 850; SD 855; SDM630; SDM660; SDX20; SDX24

Trust: 2.07

sources: NVD: CVE-2018-13919 // JVNDB: JVNDB-2018-015633 // BID: 108296 // VULHUB: VHN-124026 // VULMON: CVE-2018-13919

AFFECTED PRODUCTS

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs405scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs405scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 636scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 675scope: - version: -

Trust: 0.8

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 108296 // JVNDB: JVNDB-2018-015633 // NVD: CVE-2018-13919

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-13919
value: HIGH

Trust: 1.0

NVD: CVE-2018-13919
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-178
value: HIGH

Trust: 0.6

VULHUB: VHN-124026
value: HIGH

Trust: 0.1

VULMON: CVE-2018-13919
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-13919
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-124026
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-13919
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-124026 // VULMON: CVE-2018-13919 // JVNDB: JVNDB-2018-015633 // CNNVD: CNNVD-201905-178 // NVD: CVE-2018-13919

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.9

sources: VULHUB: VHN-124026 // JVNDB: JVNDB-2018-015633 // NVD: CVE-2018-13919

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201905-178

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201905-178

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015633

PATCH

title:May 2019 Code Aurora Security Bulletinurl:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 0.8

title:Android Qualcomm Data HLOS - LNX Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92322

Trust: 0.6

sources: JVNDB: JVNDB-2018-015633 // CNNVD: CNNVD-201905-178

EXTERNAL IDS

db:NVDid:CVE-2018-13919

Trust: 2.9

db:BIDid:108296

Trust: 1.0

db:JVNDBid:JVNDB-2018-015633

Trust: 0.8

db:CNNVDid:CNNVD-201905-178

Trust: 0.7

db:VULHUBid:VHN-124026

Trust: 0.1

db:VULMONid:CVE-2018-13919

Trust: 0.1

sources: VULHUB: VHN-124026 // VULMON: CVE-2018-13919 // BID: 108296 // JVNDB: JVNDB-2018-015633 // CNNVD: CNNVD-201905-178 // NVD: CVE-2018-13919

REFERENCES

url:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 2.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-13919

Trust: 1.4

url:http://code.google.com/android/

Trust: 0.9

url:https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2df8cec1c3ee66d82313e67c2f3129e62296a4de

Trust: 0.9

url:https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee4f1ec45cc6bd7da0a4b111d772a4058e1df152

Trust: 0.9

url:http://www.qualcomm.com/

Trust: 0.9

url:https://source.android.com/security/bulletin/2019-05-01

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13919

Trust: 0.8

url:https://www.securityfocus.com/bid/108296

Trust: 0.7

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-may-2019-29239

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-124026 // VULMON: CVE-2018-13919 // BID: 108296 // JVNDB: JVNDB-2018-015633 // CNNVD: CNNVD-201905-178 // NVD: CVE-2018-13919

CREDITS

Pengfei Ding of Huawei and Google.

Trust: 0.9

sources: BID: 108296 // CNNVD: CNNVD-201905-178

SOURCES

db:VULHUBid:VHN-124026
db:VULMONid:CVE-2018-13919
db:BIDid:108296
db:JVNDBid:JVNDB-2018-015633
db:CNNVDid:CNNVD-201905-178
db:NVDid:CVE-2018-13919

LAST UPDATE DATE

2024-11-23T21:52:10.686000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-124026date:2019-06-17T00:00:00
db:VULMONid:CVE-2018-13919date:2019-06-17T00:00:00
db:BIDid:108296date:2019-05-06T00:00:00
db:JVNDBid:JVNDB-2018-015633date:2019-06-21T00:00:00
db:CNNVDid:CNNVD-201905-178date:2019-06-18T00:00:00
db:NVDid:CVE-2018-13919date:2024-11-21T03:48:20.380

SOURCES RELEASE DATE

db:VULHUBid:VHN-124026date:2019-06-14T00:00:00
db:VULMONid:CVE-2018-13919date:2019-06-14T00:00:00
db:BIDid:108296date:2019-05-06T00:00:00
db:JVNDBid:JVNDB-2018-015633date:2019-06-21T00:00:00
db:CNNVDid:CNNVD-201905-178date:2019-05-07T00:00:00
db:NVDid:CVE-2018-13919date:2019-06-14T17:29:01.003