ID

VAR-201906-0843


CVE

CVE-2018-11819


TITLE

plural Snapdragon Vulnerability in using freed memory in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015637

DESCRIPTION

Use after issue in WLAN function due to multiple ACS scan requests at a time in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 675, SD 730, SD 820A, SD 835, SD 855, SDA660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and other products are products of Qualcomm. The MDM9206 is a central processing unit (CPU) product. The MDM9607 is a central processing unit (CPU) product. The MDM9640 is a central processing unit (CPU) product. A resource management error vulnerability exists in the WLAN features in several Qualcomm products. The vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. There are currently no detailed details of the vulnerability provided. The following products and versions are affected: Qualcomm MDM9206; MDM9607; MDM9640; MDM9650; MSM8996AU; SD855; SDA660; SDX20; SDX24

Trust: 2.25

sources: NVD: CVE-2018-11819 // JVNDB: JVNDB-2018-015637 // CNVD: CNVD-2019-18599 // VULHUB: VHN-121716

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-18599

AFFECTED PRODUCTS

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 1.4

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 1.4

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 1.4

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 1.4

vendor:qualcommmodel:mdm9640scope: - version: -

Trust: 1.4

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 1.4

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 435scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdscope:eqversion:835

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:625

Trust: 0.6

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:855

Trust: 0.6

vendor:qualcommmodel:sda660scope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdx20scope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:425

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:427

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:430

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:435

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:450

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:675

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:730

Trust: 0.6

vendor:qualcommmodel:sdx24scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-18599 // JVNDB: JVNDB-2018-015637 // NVD: CVE-2018-11819

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11819
value: HIGH

Trust: 1.0

NVD: CVE-2018-11819
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-18599
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-609
value: HIGH

Trust: 0.6

VULHUB: VHN-121716
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-11819
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-18599
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-121716
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11819
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-18599 // VULHUB: VHN-121716 // JVNDB: JVNDB-2018-015637 // CNNVD: CNNVD-201906-609 // NVD: CVE-2018-11819

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.9

sources: VULHUB: VHN-121716 // JVNDB: JVNDB-2018-015637 // NVD: CVE-2018-11819

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201906-609

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201906-609

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015637

PATCH

title:May 2019 Code Aurora Security Bulletinurl:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 0.8

title:Patches for several Qualcomm Product Resource Management Error Vulnerabilities (CNVD-2019-18599)url:https://www.cnvd.org.cn/patchInfo/show/164007

Trust: 0.6

title:Multiple Qualcomm Product resource management error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93826

Trust: 0.6

sources: CNVD: CNVD-2019-18599 // JVNDB: JVNDB-2018-015637 // CNNVD: CNNVD-201906-609

EXTERNAL IDS

db:NVDid:CVE-2018-11819

Trust: 3.1

db:JVNDBid:JVNDB-2018-015637

Trust: 0.8

db:CNNVDid:CNNVD-201906-609

Trust: 0.7

db:CNVDid:CNVD-2019-18599

Trust: 0.6

db:VULHUBid:VHN-121716

Trust: 0.1

sources: CNVD: CNVD-2019-18599 // VULHUB: VHN-121716 // JVNDB: JVNDB-2018-015637 // CNNVD: CNNVD-201906-609 // NVD: CVE-2018-11819

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-11819

Trust: 2.0

url:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11819

Trust: 0.8

sources: CNVD: CNVD-2019-18599 // VULHUB: VHN-121716 // JVNDB: JVNDB-2018-015637 // CNNVD: CNNVD-201906-609 // NVD: CVE-2018-11819

SOURCES

db:CNVDid:CNVD-2019-18599
db:VULHUBid:VHN-121716
db:JVNDBid:JVNDB-2018-015637
db:CNNVDid:CNNVD-201906-609
db:NVDid:CVE-2018-11819

LAST UPDATE DATE

2024-11-23T22:41:29.137000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-18599date:2019-06-19T00:00:00
db:VULHUBid:VHN-121716date:2019-06-17T00:00:00
db:JVNDBid:JVNDB-2018-015637date:2019-06-21T00:00:00
db:CNNVDid:CNNVD-201906-609date:2019-06-18T00:00:00
db:NVDid:CVE-2018-11819date:2024-11-21T03:44:05.023

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-18599date:2019-06-19T00:00:00
db:VULHUBid:VHN-121716date:2019-06-14T00:00:00
db:JVNDBid:JVNDB-2018-015637date:2019-06-21T00:00:00
db:CNNVDid:CNNVD-201906-609date:2019-06-14T00:00:00
db:NVDid:CVE-2018-11819date:2019-06-14T17:29:00.267