ID

VAR-201906-0811


CVE

CVE-2018-11942


TITLE

plural Snapdragon Information disclosure vulnerability in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015660

DESCRIPTION

Failure to initialize the reserved memory which is sent to the firmware might lead to exposure of 1 byte of uninitialized kernel SKB memory to FW in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an information disclosure vulnerability.Information may be obtained. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem. WLAN is one of the wireless local area network components. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components. The following products and versions are affected: Qualcomm IPQ4019; IPQ8064; IPQ8074; MDM9150; MDM9206; MDM9607; MDM9640; MDM9650; SD 675; SD 712; SD 710; SD 670; SD 730; SD 820A; SD 835; SD 845; SD 850; SD 855; SDA660;

Trust: 1.71

sources: NVD: CVE-2018-11942 // JVNDB: JVNDB-2018-015660 // VULHUB: VHN-121852

AFFECTED PRODUCTS

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs405scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8064scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq4019scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq4019scope: - version: -

Trust: 0.8

vendor:qualcommmodel:ipq8064scope: - version: -

Trust: 0.8

vendor:qualcommmodel:ipq8074scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9150scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9640scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs405scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-015660 // NVD: CVE-2018-11942

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11942
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-11942
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201906-607
value: MEDIUM

Trust: 0.6

VULHUB: VHN-121852
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-11942
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-121852
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11942
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121852 // JVNDB: JVNDB-2018-015660 // CNNVD: CNNVD-201906-607 // NVD: CVE-2018-11942

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-121852 // JVNDB: JVNDB-2018-015660 // NVD: CVE-2018-11942

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201906-607

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201906-607

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015660

PATCH

title:May 2019 Code Aurora Security Bulletin (CVE-2018-11942)url:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 0.8

title:Multiple Qualcomm product WLAN Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93824

Trust: 0.6

sources: JVNDB: JVNDB-2018-015660 // CNNVD: CNNVD-201906-607

EXTERNAL IDS

db:NVDid:CVE-2018-11942

Trust: 2.5

db:JVNDBid:JVNDB-2018-015660

Trust: 0.8

db:CNNVDid:CNNVD-201906-607

Trust: 0.7

db:VULHUBid:VHN-121852

Trust: 0.1

sources: VULHUB: VHN-121852 // JVNDB: JVNDB-2018-015660 // CNNVD: CNNVD-201906-607 // NVD: CVE-2018-11942

REFERENCES

url:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-11942

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11942

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243

Trust: 0.6

sources: VULHUB: VHN-121852 // JVNDB: JVNDB-2018-015660 // CNNVD: CNNVD-201906-607 // NVD: CVE-2018-11942

SOURCES

db:VULHUBid:VHN-121852
db:JVNDBid:JVNDB-2018-015660
db:CNNVDid:CNNVD-201906-607
db:NVDid:CVE-2018-11942

LAST UPDATE DATE

2024-11-23T22:44:58.335000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121852date:2019-06-18T00:00:00
db:JVNDBid:JVNDB-2018-015660date:2019-06-21T00:00:00
db:CNNVDid:CNNVD-201906-607date:2019-09-05T00:00:00
db:NVDid:CVE-2018-11942date:2024-11-21T03:44:17.883

SOURCES RELEASE DATE

db:VULHUBid:VHN-121852date:2019-06-14T00:00:00
db:JVNDBid:JVNDB-2018-015660date:2019-06-21T00:00:00
db:CNNVDid:CNNVD-201906-607date:2019-06-14T00:00:00
db:NVDid:CVE-2018-11942date:2019-06-14T17:29:00.470