ID

VAR-201907-0886


CVE

CVE-2019-2287


TITLE

plural Snapdragon Vulnerability related to out-of-bounds writing in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-006654

DESCRIPTION

Improper validation for inputs received from firmware can lead to an out of bound write issue in video driver. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Components are prone to the following security vulnerabilities: 1. Multiple buffer-overflow vulnerabilities 2. A denial-of-service vulnerability An attacker can exploit these issues to execute arbitrary code, and cause a denial-of-service condition. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-123700924, A-114399807, A-123999895, and A-127513046. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. MDM9640 is a central processing unit (CPU) product. A buffer error vulnerability exists in several Qualcomm products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations

Trust: 2.07

sources: NVD: CVE-2019-2287 // JVNDB: JVNDB-2019-006654 // BID: 108555 // VULHUB: VHN-153722 // VULMON: CVE-2019-2287

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs405scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6574auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 665scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9640scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6574auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs405scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 108555 // JVNDB: JVNDB-2019-006654 // NVD: CVE-2019-2287

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-2287
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-2287
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201906-083
value: CRITICAL

Trust: 0.6

VULHUB: VHN-153722
value: HIGH

Trust: 0.1

VULMON: CVE-2019-2287
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-2287
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-153722
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-2287
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-153722 // VULMON: CVE-2019-2287 // JVNDB: JVNDB-2019-006654 // CNNVD: CNNVD-201906-083 // NVD: CVE-2019-2287

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.9

sources: VULHUB: VHN-153722 // JVNDB: JVNDB-2019-006654 // NVD: CVE-2019-2287

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-083

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201906-083

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006654

PATCH

title:June 2019 Code Aurora Security Bulletinurl:https://www.codeaurora.org/security-bulletin/2019/06/03/june-2019-code-aurora-security-bulletin

Trust: 0.8

title:Qualcomm Video Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93172

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2019/06/05/android_june_patch/

Trust: 0.2

title:Patchlocatorurl:https://github.com/seclab-ucr/Patchlocator

Trust: 0.1

title:Patchlocatorurl:https://github.com/zhangzhenghsy/Patchlocator

Trust: 0.1

sources: VULMON: CVE-2019-2287 // JVNDB: JVNDB-2019-006654 // CNNVD: CNNVD-201906-083

EXTERNAL IDS

db:NVDid:CVE-2019-2287

Trust: 2.9

db:BIDid:108555

Trust: 1.0

db:JVNDBid:JVNDB-2019-006654

Trust: 0.8

db:CNNVDid:CNNVD-201906-083

Trust: 0.7

db:VULHUBid:VHN-153722

Trust: 0.1

db:VULMONid:CVE-2019-2287

Trust: 0.1

sources: VULHUB: VHN-153722 // VULMON: CVE-2019-2287 // BID: 108555 // JVNDB: JVNDB-2019-006654 // CNNVD: CNNVD-201906-083 // NVD: CVE-2019-2287

REFERENCES

url:https://www.codeaurora.org/security-bulletin/2019/06/03/june-2019-code-aurora-security-bulletin

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-2287

Trust: 1.4

url:http://code.google.com/android/

Trust: 0.9

url:https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9c0fa2ad7dab4d11c866cb4677c3cd2561b829b

Trust: 0.9

url:https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit?id=3186af9f3ece8d5d07a3d62cc1a64b448eab375b

Trust: 0.9

url:https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?h=wlan-cld3.driver.lnx.1.1.r41-rel&id=a01623699ad76fc6947483b063727f417d526df7

Trust: 0.9

url:https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=d056949890ebd0ab90b284c34886e51a6c1e1515

Trust: 0.9

url:http://www.qualcomm.com/

Trust: 0.9

url:https://source.android.com/security/bulletin/2019-06-01.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2287

Trust: 0.8

url:https://www.securityfocus.com/bid/108555

Trust: 0.7

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-june-2019-29461

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/seclab-ucr/patchlocator

Trust: 0.1

sources: VULHUB: VHN-153722 // VULMON: CVE-2019-2287 // BID: 108555 // JVNDB: JVNDB-2019-006654 // CNNVD: CNNVD-201906-083 // NVD: CVE-2019-2287

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 108555

SOURCES

db:VULHUBid:VHN-153722
db:VULMONid:CVE-2019-2287
db:BIDid:108555
db:JVNDBid:JVNDB-2019-006654
db:CNNVDid:CNNVD-201906-083
db:NVDid:CVE-2019-2287

LAST UPDATE DATE

2024-08-14T13:26:08.839000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-153722date:2019-07-23T00:00:00
db:VULMONid:CVE-2019-2287date:2019-07-23T00:00:00
db:BIDid:108555date:2019-06-03T00:00:00
db:JVNDBid:JVNDB-2019-006654date:2019-07-24T00:00:00
db:CNNVDid:CNNVD-201906-083date:2019-07-24T00:00:00
db:NVDid:CVE-2019-2287date:2019-07-23T13:24:47.377

SOURCES RELEASE DATE

db:VULHUBid:VHN-153722date:2019-07-22T00:00:00
db:VULMONid:CVE-2019-2287date:2019-07-22T00:00:00
db:BIDid:108555date:2019-06-03T00:00:00
db:JVNDBid:JVNDB-2019-006654date:2019-07-24T00:00:00
db:CNNVDid:CNNVD-201906-083date:2019-06-03T00:00:00
db:NVDid:CVE-2019-2287date:2019-07-22T14:15:12.893