ID

VAR-201907-0883


CVE

CVE-2019-2253


TITLE

plural Snapdragon Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-006965

DESCRIPTION

Buffer over-read can occur while parsing an ogg file with a corrupted comment block. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20. plural Snapdragon The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem. Input validation error vulnerabilities exist in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. There is currently no detailed vulnerability details provided. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299

Trust: 2.61

sources: NVD: CVE-2019-2253 // JVNDB: JVNDB-2019-006965 // CNVD: CNVD-2020-20158 // BID: 108986 // VULHUB: VHN-153688 // VULMON: CVE-2019-2253

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-20158

AFFECTED PRODUCTS

vendor:qualcommmodel:qcs405scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 665scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 600scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs405scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:qualcommmodel:215scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:425

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:427

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:430

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:435

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:450

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:625

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:636

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:712

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:710

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:670

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:845

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:850

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:855

Trust: 0.6

vendor:qualcommmodel:sdm630 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdm660 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:msm8909w noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:qcs405 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:675

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:730

Trust: 0.6

vendor:qualcommmodel:sdx24 noscope: - version: -

Trust: 0.6

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2020-20158 // BID: 108986 // JVNDB: JVNDB-2019-006965 // NVD: CVE-2019-2253

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-2253
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-2253
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-20158
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-079
value: CRITICAL

Trust: 0.6

VULHUB: VHN-153688
value: HIGH

Trust: 0.1

VULMON: CVE-2019-2253
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-2253
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2020-20158
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-153688
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-2253
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2020-20158 // VULHUB: VHN-153688 // VULMON: CVE-2019-2253 // JVNDB: JVNDB-2019-006965 // CNNVD: CNNVD-201907-079 // NVD: CVE-2019-2253

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-153688 // JVNDB: JVNDB-2019-006965 // NVD: CVE-2019-2253

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-079

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201907-079

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006965

PATCH

title:July 2019 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20158)url:https://www.cnvd.org.cn/patchInfo/show/211555

Trust: 0.6

title:Multiple Qualcomm Product input verification error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94313

Trust: 0.6

sources: CNVD: CNVD-2020-20158 // JVNDB: JVNDB-2019-006965 // CNNVD: CNNVD-201907-079

EXTERNAL IDS

db:NVDid:CVE-2019-2253

Trust: 3.5

db:BIDid:108986

Trust: 1.6

db:JVNDBid:JVNDB-2019-006965

Trust: 0.8

db:CNVDid:CNVD-2020-20158

Trust: 0.7

db:CNNVDid:CNNVD-201907-079

Trust: 0.7

db:VULHUBid:VHN-153688

Trust: 0.1

db:VULMONid:CVE-2019-2253

Trust: 0.1

sources: CNVD: CNVD-2020-20158 // VULHUB: VHN-153688 // VULMON: CVE-2019-2253 // BID: 108986 // JVNDB: JVNDB-2019-006965 // CNNVD: CNNVD-201907-079 // NVD: CVE-2019-2253

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-2253

Trust: 1.4

url:http://www.securityfocus.com/bid/108986

Trust: 1.3

url:http://code.google.com/android/

Trust: 0.9

url:http://www.qualcomm.com/

Trust: 0.9

url:https://source.android.com/security/bulletin/2019-07-01.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2253

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-july-2019-29673

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2020-20158 // VULHUB: VHN-153688 // VULMON: CVE-2019-2253 // BID: 108986 // JVNDB: JVNDB-2019-006965 // CNNVD: CNNVD-201907-079 // NVD: CVE-2019-2253

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 108986 // CNNVD: CNNVD-201907-079

SOURCES

db:CNVDid:CNVD-2020-20158
db:VULHUBid:VHN-153688
db:VULMONid:CVE-2019-2253
db:BIDid:108986
db:JVNDBid:JVNDB-2019-006965
db:CNNVDid:CNNVD-201907-079
db:NVDid:CVE-2019-2253

LAST UPDATE DATE

2024-11-23T21:37:05.814000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-20158date:2020-03-30T00:00:00
db:VULHUBid:VHN-153688date:2020-08-24T00:00:00
db:VULMONid:CVE-2019-2253date:2020-08-24T00:00:00
db:BIDid:108986date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-006965date:2019-07-30T00:00:00
db:CNNVDid:CNNVD-201907-079date:2020-10-28T00:00:00
db:NVDid:CVE-2019-2253date:2024-11-21T04:40:32.740

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-20158date:2020-03-30T00:00:00
db:VULHUBid:VHN-153688date:2019-07-25T00:00:00
db:VULMONid:CVE-2019-2253date:2019-07-25T00:00:00
db:BIDid:108986date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-006965date:2019-07-30T00:00:00
db:CNNVDid:CNNVD-201907-079date:2019-07-02T00:00:00
db:NVDid:CVE-2019-2253date:2019-07-25T17:15:12.410