ID

VAR-201906-0996


CVE

CVE-2018-5903


TITLE

plural Snapdragon Vulnerability related to array index verification in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015622

DESCRIPTION

Out of bounds read occurs due to improper validation of array while processing VDEV stop response from WLAN firmware in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS405, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. MDM9640 is a central processing unit (CPU) product. WLAN is one of the wireless local area network components. An input validation error vulnerability exists in WLAN in several Qualcomm products. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Qualcomm MDM9206; MDM9607; MDM9640; MDM9650; MSM8996AU; QCS405; QCS605; SD 210; SD 212; SD 205; SD 675; SD 712; SD 710; SD 670; SD 730; SD 820A; SD 835; SD 855; SDA660; SDM630; SDM660; SDX20; SDX24

Trust: 1.8

sources: NVD: CVE-2018-5903 // JVNDB: JVNDB-2018-015622 // VULHUB: VHN-135935 // VULMON: CVE-2018-5903

IOT TAXONOMY

category:['other device', 'embedded device']sub_category:SoC

Trust: 0.1

category:['other device', 'embedded device']sub_category:general

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs405scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9640scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs405scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-015622 // NVD: CVE-2018-5903

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5903
value: HIGH

Trust: 1.0

NVD: CVE-2018-5903
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201906-615
value: HIGH

Trust: 0.6

VULHUB: VHN-135935
value: HIGH

Trust: 0.1

VULMON: CVE-2018-5903
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5903
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-135935
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5903
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-135935 // VULMON: CVE-2018-5903 // JVNDB: JVNDB-2018-015622 // CNNVD: CNNVD-201906-615 // NVD: CVE-2018-5903

PROBLEMTYPE DATA

problemtype:CWE-129

Trust: 1.9

sources: VULHUB: VHN-135935 // JVNDB: JVNDB-2018-015622 // NVD: CVE-2018-5903

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201906-615

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201906-615

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015622

PATCH

title:May 2019 Code Aurora Security Bulletinurl:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 0.8

title:Multiple Qualcomm product WLAN Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93831

Trust: 0.6

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

sources: VULMON: CVE-2018-5903 // JVNDB: JVNDB-2018-015622 // CNNVD: CNNVD-201906-615

EXTERNAL IDS

db:NVDid:CVE-2018-5903

Trust: 2.7

db:JVNDBid:JVNDB-2018-015622

Trust: 0.8

db:CNNVDid:CNNVD-201906-615

Trust: 0.7

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-135935

Trust: 0.1

db:VULMONid:CVE-2018-5903

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-135935 // VULMON: CVE-2018-5903 // JVNDB: JVNDB-2018-015622 // CNNVD: CNNVD-201906-615 // NVD: CVE-2018-5903

REFERENCES

url:https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5903

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5903

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/129.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/samreleasenotes/samsungreleasenotes

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-135935 // VULMON: CVE-2018-5903 // JVNDB: JVNDB-2018-015622 // CNNVD: CNNVD-201906-615 // NVD: CVE-2018-5903

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-135935
db:VULMONid:CVE-2018-5903
db:JVNDBid:JVNDB-2018-015622
db:CNNVDid:CNNVD-201906-615
db:NVDid:CVE-2018-5903

LAST UPDATE DATE

2025-01-30T19:29:42.276000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-135935date:2019-06-17T00:00:00
db:VULMONid:CVE-2018-5903date:2019-06-17T00:00:00
db:JVNDBid:JVNDB-2018-015622date:2019-06-20T00:00:00
db:CNNVDid:CNNVD-201906-615date:2019-06-18T00:00:00
db:NVDid:CVE-2018-5903date:2024-11-21T04:09:40.197

SOURCES RELEASE DATE

db:VULHUBid:VHN-135935date:2019-06-14T00:00:00
db:VULMONid:CVE-2018-5903date:2019-06-14T00:00:00
db:JVNDBid:JVNDB-2018-015622date:2019-06-20T00:00:00
db:CNNVDid:CNNVD-201906-615date:2019-06-14T00:00:00
db:NVDid:CVE-2018-5903date:2019-06-14T17:29:01.173