var-201906-0994
Vulnerability from variot
A buffer overflow can occur while processing an extscan hotlist event in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA9379, QCS605, SD 625, SD 636, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660, SDX20. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and other products are products of Qualcomm. The MDM9206 is a central processing unit (CPU) product. The MDM9607 is a central processing unit (CPU) product. The MDM9640 is a central processing unit (CPU) product. WLAN is one of the wireless LAN components. A buffer overflow vulnerability exists in WLANs in several Qualcomm products. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. The following products and versions are affected: Qualcomm MDM9206; MDM9607; MDM9640; MDM9650; MSM8909W; MSM8996AU; QCA9379; QCS605;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0994", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mdm9206", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "qca9379", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca9379", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda660", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "NVD", "id": "CVE-2018-3583" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca9379_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_636_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-015624" } ] }, "cve": "CVE-2018-3583", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-3583", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2019-18603", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-133614", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-3583", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-3583", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-3583", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-18603", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-620", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-133614", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "VULHUB", "id": "VHN-133614" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "CNNVD", "id": "CNNVD-201906-620" }, { "db": "NVD", "id": "CVE-2018-3583" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A buffer overflow can occur while processing an extscan hotlist event in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA9379, QCS605, SD 625, SD 636, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660, SDX20. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and other products are products of Qualcomm. The MDM9206 is a central processing unit (CPU) product. The MDM9607 is a central processing unit (CPU) product. The MDM9640 is a central processing unit (CPU) product. WLAN is one of the wireless LAN components. A buffer overflow vulnerability exists in WLANs in several Qualcomm products. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. The following products and versions are affected: Qualcomm MDM9206; MDM9607; MDM9640; MDM9650; MSM8909W; MSM8996AU; QCA9379; QCS605;", "sources": [ { "db": "NVD", "id": "CVE-2018-3583" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "VULHUB", "id": "VHN-133614" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3583", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2018-015624", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-620", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-18603", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-133614", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "VULHUB", "id": "VHN-133614" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "CNNVD", "id": "CNNVD-201906-620" }, { "db": "NVD", "id": "CVE-2018-3583" } ] }, "id": "VAR-201906-0994", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "VULHUB", "id": "VHN-133614" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" } ] }, "last_update_date": "2024-11-23T21:37:12.344000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "May 2019 Code Aurora Security Bulletin", "trust": 0.8, "url": "https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin" }, { "title": "Patches for WLAN Buffer Overflow Vulnerabilities in Multiple Qualcomm Products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/163911" }, { "title": "Multiple Qualcomm product WLAN Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93836" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "CNNVD", "id": "CNNVD-201906-620" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133614" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "NVD", "id": "CVE-2018-3583" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3583" }, { "trust": 1.7, "url": "https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3583" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "VULHUB", "id": "VHN-133614" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "CNNVD", "id": "CNNVD-201906-620" }, { "db": "NVD", "id": "CVE-2018-3583" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-18603" }, { "db": "VULHUB", "id": "VHN-133614" }, { "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "db": "CNNVD", "id": "CNNVD-201906-620" }, { "db": "NVD", "id": "CVE-2018-3583" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2019-18603" }, { "date": "2019-06-14T00:00:00", "db": "VULHUB", "id": "VHN-133614" }, { "date": "2019-06-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "date": "2019-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-620" }, { "date": "2019-06-14T17:29:01.080000", "db": "NVD", "id": "CVE-2018-3583" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2019-18603" }, { "date": "2019-06-17T00:00:00", "db": "VULHUB", "id": "VHN-133614" }, { "date": "2019-06-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-015624" }, { "date": "2019-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-620" }, { "date": "2024-11-21T04:05:42.633000", "db": "NVD", "id": "CVE-2018-3583" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-620" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-015624" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-620" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.