ID

VAR-201911-1698


CVE

CVE-2019-10531


TITLE

plural Snapdragon Classic buffer overflow vulnerability in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-011681

DESCRIPTION

Incorrect reading of system image resulting in buffer overflow when size of system image is increased in Snapdragon Auto, Snapdragon Mobile, Snapdragon Wearables in MDM9607, MSM8909W, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SDM439. plural Snapdragon The product contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607 is a central processing unit (CPU) product of Qualcomm. Input validation error vulnerability exists in HLOS in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available

Trust: 2.16

sources: NVD: CVE-2019-10531 // JVNDB: JVNDB-2019-011681 // CNVD: CNVD-2020-20159

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-20159

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:215scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 429scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 439scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdscope:eqversion:210

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:212

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:205

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:425

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:439

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:429

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:450

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:625

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:632

Trust: 0.6

vendor:qualcommmodel:sdmscope:eqversion:439

Trust: 0.6

vendor:qualcommmodel:msm 8909wscope: - version: -

Trust: 0.6

vendor:qualcommmodel:mdmscope:eqversion:9607

Trust: 0.6

vendor:qualcommmodel: - scope:eqversion:215215

Trust: 0.6

sources: CNVD: CNVD-2020-20159 // JVNDB: JVNDB-2019-011681 // NVD: CVE-2019-10531

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-10531
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-10531
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-20159
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201909-158
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2019-10531
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-20159
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-10531
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-10531
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-20159 // JVNDB: JVNDB-2019-011681 // CNNVD: CNNVD-201909-158 // NVD: CVE-2019-10531

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.8

sources: JVNDB: JVNDB-2019-011681 // NVD: CVE-2019-10531

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201909-158

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201909-158

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-011681

PATCH

title:Android のセキュリティに関する公開情報url:https://source.android.com/security/bulletin/

Trust: 0.8

title:Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20159)url:https://www.cnvd.org.cn/patchInfo/show/211541

Trust: 0.6

title:Multiple Qualcomm Product input verification error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97920

Trust: 0.6

sources: CNVD: CNVD-2020-20159 // JVNDB: JVNDB-2019-011681 // CNNVD: CNNVD-201909-158

EXTERNAL IDS

db:NVDid:CVE-2019-10531

Trust: 3.0

db:JVNDBid:JVNDB-2019-011681

Trust: 0.8

db:CNVDid:CNVD-2020-20159

Trust: 0.6

db:CNNVDid:CNNVD-201909-158

Trust: 0.6

sources: CNVD: CNVD-2020-20159 // JVNDB: JVNDB-2019-011681 // CNNVD: CNNVD-201909-158 // NVD: CVE-2019-10531

REFERENCES

url:https://source.android.com/security/bulletin/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-10531

Trust: 1.4

url:https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10531

Trust: 0.8

url:https://source.android.com/security/bulletin/2019-09-01

Trust: 0.6

url:https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243

Trust: 0.6

sources: CNVD: CNVD-2020-20159 // JVNDB: JVNDB-2019-011681 // CNNVD: CNNVD-201909-158 // NVD: CVE-2019-10531

SOURCES

db:CNVDid:CNVD-2020-20159
db:JVNDBid:JVNDB-2019-011681
db:CNNVDid:CNNVD-201909-158
db:NVDid:CVE-2019-10531

LAST UPDATE DATE

2024-11-23T22:21:23.791000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-20159date:2020-03-30T00:00:00
db:JVNDBid:JVNDB-2019-011681date:2019-11-15T00:00:00
db:CNNVDid:CNNVD-201909-158date:2019-11-11T00:00:00
db:NVDid:CVE-2019-10531date:2024-11-21T04:19:22.320

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-20159date:2020-03-30T00:00:00
db:JVNDBid:JVNDB-2019-011681date:2019-11-15T00:00:00
db:CNNVDid:CNNVD-201909-158date:2019-09-04T00:00:00
db:NVDid:CVE-2019-10531date:2019-11-06T17:15:12.643