ID

VAR-201907-0869


CVE

CVE-2019-2272


TITLE

plural Snapdragon Buffer error vulnerability in product

Trust: 0.8

sources: JVNDB: JVNDB-2019-006962

DESCRIPTION

Buffer overflow can occur in display function due to lack of validation of header block size set by user. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SDM660, SDX20. plural Snapdragon The product contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem. A buffer error vulnerability exists in several Qualcomm products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc

Trust: 1.71

sources: NVD: CVE-2019-2272 // JVNDB: JVNDB-2019-006962 // VULHUB: VHN-153707

AFFECTED PRODUCTS

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-006962 // NVD: CVE-2019-2272

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-2272
value: HIGH

Trust: 1.0

NVD: CVE-2019-2272
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201907-1322
value: HIGH

Trust: 0.6

VULHUB: VHN-153707
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-2272
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-153707
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-2272
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-153707 // JVNDB: JVNDB-2019-006962 // CNNVD: CNNVD-201907-1322 // NVD: CVE-2019-2272

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-153707 // JVNDB: JVNDB-2019-006962 // NVD: CVE-2019-2272

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201907-1322

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201907-1322

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006962

PATCH

title:July 2019 Code Aurora Security Bulletinurl:https://www.codeaurora.org/security-bulletin/2019/07/01/july-2019-code-aurora-security-bulletin

Trust: 0.8

title:Multiple Qualcomm Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95469

Trust: 0.6

sources: JVNDB: JVNDB-2019-006962 // CNNVD: CNNVD-201907-1322

EXTERNAL IDS

db:NVDid:CVE-2019-2272

Trust: 2.5

db:JVNDBid:JVNDB-2019-006962

Trust: 0.8

db:CNNVDid:CNNVD-201907-1322

Trust: 0.7

db:VULHUBid:VHN-153707

Trust: 0.1

sources: VULHUB: VHN-153707 // JVNDB: JVNDB-2019-006962 // CNNVD: CNNVD-201907-1322 // NVD: CVE-2019-2272

REFERENCES

url:https://www.codeaurora.org/security-bulletin/2019/07/01/july-2019-code-aurora-security-bulletin

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-2272

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2272

Trust: 0.8

sources: VULHUB: VHN-153707 // JVNDB: JVNDB-2019-006962 // CNNVD: CNNVD-201907-1322 // NVD: CVE-2019-2272

CREDITS

heidada (heiheidada)

Trust: 0.6

sources: CNNVD: CNNVD-201907-1322

SOURCES

db:VULHUBid:VHN-153707
db:JVNDBid:JVNDB-2019-006962
db:CNNVDid:CNNVD-201907-1322
db:NVDid:CVE-2019-2272

LAST UPDATE DATE

2024-11-23T22:51:43.058000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-153707date:2019-07-29T00:00:00
db:JVNDBid:JVNDB-2019-006962date:2019-07-30T00:00:00
db:CNNVDid:CNNVD-201907-1322date:2019-07-30T00:00:00
db:NVDid:CVE-2019-2272date:2024-11-21T04:40:35.390

SOURCES RELEASE DATE

db:VULHUBid:VHN-153707date:2019-07-25T00:00:00
db:JVNDBid:JVNDB-2019-006962date:2019-07-30T00:00:00
db:CNNVDid:CNNVD-201907-1322date:2019-07-25T00:00:00
db:NVDid:CVE-2019-2272date:2019-07-25T17:15:12.630