Vulnerabilites related to qualcomm - msm8974
Vulnerability from fkie_nvd
Published
2021-05-07 09:15
Modified
2024-11-21 04:57
Summary
Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile
Impacted products
Vendor Product Version
qualcomm apq8009 -
qualcomm apq8016 -
qualcomm apq8074 -
qualcomm apq8084 -
qualcomm apq8094 -
qualcomm ar6003 -
qualcomm mdm8215 -
qualcomm mdm8215m -
qualcomm mdm8615m -
qualcomm mdm9215 -
qualcomm mdm9235m -
qualcomm mdm9310 -
qualcomm mdm9609 -
qualcomm mdm9615 -
qualcomm mdm9615m -
qualcomm mdm9635m -
qualcomm mdm9640 -
qualcomm mdm9645 -
qualcomm msm8108 -
qualcomm msm8208 -
qualcomm msm8209 -
qualcomm msm8216 -
qualcomm msm8274 -
qualcomm msm8608 -
qualcomm msm8674 -
qualcomm msm8916 -
qualcomm msm8929 -
qualcomm msm8939 -
qualcomm msm8974 -
qualcomm msm8974p -
qualcomm msm8994 -
qualcomm pm8018 -
qualcomm pm8841 -
qualcomm pm8909 -
qualcomm pm8916 -
qualcomm pm8941 -
qualcomm pm8994 -
qualcomm pmd9635 -
qualcomm pmd9645 -
qualcomm pmi8994 -
qualcomm qca1990 -
qualcomm qca6174 -
qualcomm qca6174a -
qualcomm qca6584 -
qualcomm qfe1035 -
qualcomm qfe1040 -
qualcomm qfe1045 -
qualcomm qfe1100 -
qualcomm qfe1101 -
qualcomm qfe1520 -
qualcomm qfe1550 -
qualcomm qfe2101 -
qualcomm qfe2310 -
qualcomm qfe2320 -
qualcomm qfe2330 -
qualcomm qfe2340 -
qualcomm qfe2520 -
qualcomm qfe2550 -
qualcomm qfe2720 -
qualcomm qfe3100 -
qualcomm qfe3320 -
qualcomm qfe3335 -
qualcomm qfe3340 -
qualcomm qfe3345 -
qualcomm sd210 -
qualcomm smb1360 -
qualcomm wcd9306 -
qualcomm wcd9330 -
qualcomm wcn3610 -
qualcomm wcn3620 -
qualcomm wcn3660 -
qualcomm wcn3660a -
qualcomm wcn3660b -
qualcomm wcn3680 -
qualcomm wcn3680b -
qualcomm wfr1620 -
qualcomm wgr7640 -
qualcomm wtr1605 -
qualcomm wtr1605l -
qualcomm wtr1625 -
qualcomm wtr1625l -
qualcomm wtr2605 -
qualcomm wtr2955 -
qualcomm wtr3925 -
qualcomm wtr4605 -
qualcomm wtr4905 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CC498E0-B82B-4A53-8F55-6C1DA58AFA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:apq8016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E79D48-F105-4D64-8C8F-88FE0345F5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:apq8074:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51221D96-CF0A-431B-AFEE-E08D8A5BF943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:apq8084:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC2E532-1298-4B43-9EF8-AE37E1338EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:apq8094:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20239319-ACA6-4249-815D-C10D5E39A16A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:ar6003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "140FD423-FAC4-4D2D-BCFF-511E0AE8CE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm8215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F4B19E-78D9-4721-BF1E-C0330888EE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm8215m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF1E79B5-B3B1-4184-8774-A83629129190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm8615m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3CB673-B24C-4594-893B-C582E94AB2C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF064C7D-4BB8-419E-A9A2-DD75CD31FE62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9235m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2306EA19-4EF3-40C1-ADF7-F7137A732C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF11BFFD-C16A-4999-9497-6D89B8F9A9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9609:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9F2427-BCDB-45C9-AECE-6DFE5A3C3AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DF4D4E-CDAA-42BB-802E-2722E7F3DBC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9615m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA5E4BD0-32E1-422E-A841-969FA8D5AC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB323C15-2018-4CB8-858E-56F088B03FBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8F856B-70D7-4A1A-8257-90AAAE62CD6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDF54A14-FDCD-445F-9F51-4AAAA17C392D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8216:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DD07E12-75FA-40DD-8200-75BF926378C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8274:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D78BAD27-17D6-4072-BCC2-176F7F037076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDED3AA7-576C-4437-A466-D627698F4242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8674:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDAF8F0-1A78-4C23-A3A7-4188C264130A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8916:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B34A04-C686-4EC5-8B1C-53A7A5C3B19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8929:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BA466C-EB61-4C03-BF3E-A18448E6326D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8939:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA7A79E-0F04-41E6-8E37-49B2977D92B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8974:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA70411-0E39-431C-99C6-F6632C94CCB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8974p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB59C43D-637A-4E04-AB3C-62071388453C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8994:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "916FAB3E-67C7-4C97-9717-D1507C33323C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pm8018:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1E1D946-4EC1-493F-B9AE-0646D86E5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pm8841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "068BA3D0-4E7C-435D-9C5D-8015164E81DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pm8909:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2950D103-C664-44CE-86FC-49A03861441F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDA1620-8FFC-4DF4-9CBC-188D21581CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pm8941:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ACA25D6-35BF-460F-8A33-8C0975CAC31D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pm8994:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E3B29A-2A7E-466F-B081-E105352B16FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pmd9635:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D94C9DD-08B2-44A4-B789-F9B9D51E7F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pmd9645:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F95D237E-FF3D-497B-AC48-FBAEFD4481BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:pmi8994:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB63FC0F-DCE3-4F34-8851-3EEBCB52E39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qca1990:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9136B88F-3C3D-471F-8589-CA0BA4473B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2AD8F5C-1FEB-45C2-BC8F-123C2BEB0EA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0C9ED5-27E3-48EC-9A05-862715EE2034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1035:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA96119-0D78-4670-8B22-AD5AEE2C30B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED257DFF-994C-4CD9-96AA-AFE5F15AE929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1045:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FC09F3-32D6-4FA3-B93F-917B6448B541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB1B240-1B14-4C24-8D0A-30C1A76AB687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AFFE5FE-1217-45A8-97AB-8CFF9681E4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "673C190F-A55B-4F25-A8F6-2CB5FB5041AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6793E84B-9F25-420F-8CD4-50BFD7E0947E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0862428-695F-4445-AD89-536376E57E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "192EE890-B7E9-4E06-873A-BD84FBB41B90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D122C155-690C-4E3D-9725-1073F72AFB36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2330:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD27B2D-E6B7-4F01-9B07-D64370EC539C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2340:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7E73C00-29F6-42C9-9AE0-70B373D9679C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F58DA0F-88A4-4C88-A1A4-0455584D8BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC33174B-9D45-4C82-BDC1-A60B085A4513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe2720:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D08FE4FD-59EA-4FBC-A254-99B03E1EC582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A6D656-2A27-4F9F-A3BD-80ADD4141716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe3320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DD1BAE7-58B8-45E5-9CB7-D337BF4F9597",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe3335:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B890E12C-EE5F-4A93-AAED-CF68949243DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe3340:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7255B9DD-58B2-4211-B999-558EAE484B39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:qfe3345:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF9AD63-E29A-4719-BF61-FF6AF65AFB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1D7205-33E9-452B-BECD-F551801071DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC3D23FE-B3D5-4EC3-8268-98F12181966D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D7240B-DCB4-4BF4-94C7-13EBECA62D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3660a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A3CAD26-4EFA-4A37-9776-01CDB173C9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wfr1620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4346F2B3-269F-4B14-A305-708847DB2F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31DA4BC4-C634-4F62-A49E-5AD8F4FD4672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr1605:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0424E316-C8EE-420A-8861-F3E7FE178170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr1605l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD356D66-BCC8-4235-8EA3-934D5D2A7F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr1625:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A547E51D-9A43-4BC5-B11F-E3E5403D779C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr1625l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA9C4823-EEF4-4D65-84DF-3159093B0745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr2605:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD196F3-B527-4493-A46E-F85C2F127A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5516E6E3-D8DA-4172-A059-503B369E2034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27666130-DB04-457F-A968-3919FD5314BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr4605:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863053C1-5C53-4ABB-B494-F4DC01CFDB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:qualcomm:wtr4905:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A503AA01-CFD9-42D5-81D6-2F13E5DDA9A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile"
    },
    {
      "lang": "es",
      "value": "Un potencial reinicio de UE al decodificar un Sib1 o SIB1 dise\u00f1ado que programa los SIB no compatibles y puede conllevar a una denegaci\u00f3n de servicio en los productos Snapdragon Auto, Snapdragon Mobile"
    }
  ],
  "id": "CVE-2020-11268",
  "lastModified": "2024-11-21T04:57:34.743",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "product-security@qualcomm.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-07T09:15:07.773",
  "references": [
    {
      "source": "product-security@qualcomm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin"
    }
  ],
  "sourceIdentifier": "product-security@qualcomm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-18 14:29
Modified
2024-11-21 02:39
Severity ?
Summary
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability.
Impacted products
Vendor Product Version
qualcomm msm8974_firmware -
qualcomm msm8974 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:qualcomm:msm8974_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6755E875-E24B-444C-8CD8-7CAA78A30773",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:qualcomm:msm8974:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA70411-0E39-431C-99C6-F6632C94CCB4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability."
    },
    {
      "lang": "es",
      "value": "En Android, antes del nivel de parche de seguridad del 2018-04-05 o antes en Qualcomm Snapdragon Mobile MSM8974, la falta de comprobaci\u00f3n de longitud en OEMCrypto_DeriveKeysFromSessionKey() podr\u00eda conducir a una vulnerabilidad de desbordamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2015-9179",
  "lastModified": "2024-11-21T02:39:58.623",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-18T14:29:06.777",
  "references": [
    {
      "source": "product-security@qualcomm.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103671"
    },
    {
      "source": "product-security@qualcomm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://source.android.com/security/bulletin/2018-04-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://source.android.com/security/bulletin/2018-04-01"
    }
  ],
  "sourceIdentifier": "product-security@qualcomm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2015-9179
Vulnerability from cvelistv5
Published
2018-04-18 14:00
Modified
2024-09-16 22:30
Severity ?
Summary
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability.
References
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:43:41.105Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://source.android.com/security/bulletin/2018-04-01"
          },
          {
            "name": "103671",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103671"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Snapdragon Mobile",
          "vendor": "Qualcomm, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "MSM8974"
            }
          ]
        }
      ],
      "datePublic": "2018-04-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Buffer over-read vulnerability in QTEE",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-19T09:57:01",
        "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
        "shortName": "qualcomm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://source.android.com/security/bulletin/2018-04-01"
        },
        {
          "name": "103671",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103671"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@qualcomm.com",
          "DATE_PUBLIC": "2018-04-02T00:00:00",
          "ID": "CVE-2015-9179",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Snapdragon Mobile",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "MSM8974"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Qualcomm, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Buffer over-read vulnerability in QTEE"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://source.android.com/security/bulletin/2018-04-01",
              "refsource": "CONFIRM",
              "url": "https://source.android.com/security/bulletin/2018-04-01"
            },
            {
              "name": "103671",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103671"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
    "assignerShortName": "qualcomm",
    "cveId": "CVE-2015-9179",
    "datePublished": "2018-04-18T14:00:00Z",
    "dateReserved": "2017-08-16T00:00:00",
    "dateUpdated": "2024-09-16T22:30:57.691Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-11268
Vulnerability from cvelistv5
Published
2021-05-07 09:10
Modified
2024-08-04 11:28
Summary
Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile
Impacted products
Vendor Product Version
Qualcomm, Inc. Snapdragon Auto, Snapdragon Mobile Version: APQ8009, APQ8016, APQ8074, APQ8084, APQ8094, AR6003, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9235M, MDM9310, MDM9609, MDM9615, MDM9615M, MDM9635M, MDM9640, MDM9645, MSM8108, MSM8208, MSM8209, MSM8216, MSM8274, MSM8608, MSM8674, MSM8916, MSM8929, MSM8939, MSM8974, MSM8974P, MSM8994, PM8018, PM8841, PM8909, PM8916, PM8941, PM8994, PMD9635, PMD9645, PMI8994, QCA1990, QCA6174, QCA6174A, QCA6584, QFE1035, QFE1040, QFE1045, QFE1100, QFE1101, QFE1520, QFE1550, QFE2101, QFE2310, QFE2320, QFE2330, QFE2340, QFE2520, QFE2550, QFE2720, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, SD210, SMB1360, WCD9306, WCD9330, WCN3610, WCN3620, WCN3660, WCN3660A, WCN3660B, WCN3680, WCN3680B, WFR1620, WGR7640, WTR1605, WTR1605L, WTR1625, WTR1625L, WTR2605, WTR2955, WTR3925, WTR4605, WTR4905
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:28:13.813Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Snapdragon Auto, Snapdragon Mobile",
          "vendor": "Qualcomm, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "APQ8009, APQ8016, APQ8074, APQ8084, APQ8094, AR6003, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9235M, MDM9310, MDM9609, MDM9615, MDM9615M, MDM9635M, MDM9640, MDM9645, MSM8108, MSM8208, MSM8209, MSM8216, MSM8274, MSM8608, MSM8674, MSM8916, MSM8929, MSM8939, MSM8974, MSM8974P, MSM8994, PM8018, PM8841, PM8909, PM8916, PM8941, PM8994, PMD9635, PMD9645, PMI8994, QCA1990, QCA6174, QCA6174A, QCA6584, QFE1035, QFE1040, QFE1045, QFE1100, QFE1101, QFE1520, QFE1550, QFE2101, QFE2310, QFE2320, QFE2330, QFE2340, QFE2520, QFE2550, QFE2720, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, SD210, SMB1360, WCD9306, WCD9330, WCN3610, WCN3620, WCN3660, WCN3660A, WCN3660B, WCN3680, WCN3680B, WFR1620, WGR7640, WTR1605, WTR1605L, WTR1625, WTR1625L, WTR2605, WTR2955, WTR3925, WTR4605, WTR4905"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Input Validation in LTE",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-07T09:10:31",
        "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
        "shortName": "qualcomm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@qualcomm.com",
          "ID": "CVE-2020-11268",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Snapdragon Auto, Snapdragon Mobile",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "APQ8009, APQ8016, APQ8074, APQ8084, APQ8094, AR6003, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9235M, MDM9310, MDM9609, MDM9615, MDM9615M, MDM9635M, MDM9640, MDM9645, MSM8108, MSM8208, MSM8209, MSM8216, MSM8274, MSM8608, MSM8674, MSM8916, MSM8929, MSM8939, MSM8974, MSM8974P, MSM8994, PM8018, PM8841, PM8909, PM8916, PM8941, PM8994, PMD9635, PMD9645, PMI8994, QCA1990, QCA6174, QCA6174A, QCA6584, QFE1035, QFE1040, QFE1045, QFE1100, QFE1101, QFE1520, QFE1550, QFE2101, QFE2310, QFE2320, QFE2330, QFE2340, QFE2520, QFE2550, QFE2720, QFE3100, QFE3320, QFE3335, QFE3340, QFE3345, SD210, SMB1360, WCD9306, WCD9330, WCN3610, WCN3620, WCN3660, WCN3660A, WCN3660B, WCN3680, WCN3680B, WFR1620, WGR7640, WTR1605, WTR1605L, WTR1625, WTR1625L, WTR2605, WTR2955, WTR3925, WTR4605, WTR4905"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Qualcomm, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile"
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": "7.5",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Input Validation in LTE"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
              "refsource": "CONFIRM",
              "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
    "assignerShortName": "qualcomm",
    "cveId": "CVE-2020-11268",
    "datePublished": "2021-05-07T09:10:31",
    "dateReserved": "2020-03-31T00:00:00",
    "dateUpdated": "2024-08-04T11:28:13.813Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201804-0075
Vulnerability from variot

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability. Qualcomm Snapdragon Mobile MSM8974 Run on Android Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to multiple unspecified security vulnerabilities. Little is known about these issues or its effects at this time. We will update this BID as more information emerges. Android is a Linux-based open source operating system jointly developed by Google and the Open Handheld Alliance (OHA). Qualcomm MSM8974 is a central processing unit (CPU) product of Qualcomm (Qualcomm). There is a buffer overflow vulnerability in Qualcomm closed-source components in Android versions before 2018-04-05. The vulnerability is caused by the lack of length detection in the 'OEMCrypto_DeriveKeysFromSessionKey()' function. A remote attacker could exploit this vulnerability to execute arbitrary code on the system by sending a specially crafted request. The following product (used in mobile devices) is affected: Qualcomm MSM8974

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201804-0075",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "msm8974",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8974",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": "firmware"
      },
      {
        "model": "pixel xl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "0"
      },
      {
        "model": "pixel c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "0"
      },
      {
        "model": "pixel xl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "20"
      },
      {
        "model": "pixel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "20"
      },
      {
        "model": "pixel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "0"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "9"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "7"
      },
      {
        "model": "nexus 6p",
        "scope": null,
        "trust": 0.3,
        "vendor": "google",
        "version": null
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "6"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "5x"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "5"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "4"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "10"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "103671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:qualcomm:msm8974",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported these issues.",
    "sources": [
      {
        "db": "BID",
        "id": "103671"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-9179",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-9179",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-87140",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-9179",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-9179",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-9179",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201804-974",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-87140",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-9179",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MSM8974, lack of length checking in OEMCrypto_DeriveKeysFromSessionKey() could lead to a buffer overflow vulnerability. Qualcomm Snapdragon Mobile MSM8974 Run on Android Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to multiple unspecified security vulnerabilities. \nLittle is known about these issues or its effects at this time. We will update this BID as more information emerges. Android is a Linux-based open source operating system jointly developed by Google and the Open Handheld Alliance (OHA). Qualcomm MSM8974 is a central processing unit (CPU) product of Qualcomm (Qualcomm). There is a buffer overflow vulnerability in Qualcomm closed-source components in Android versions before 2018-04-05. The vulnerability is caused by the lack of length detection in the \u0027OEMCrypto_DeriveKeysFromSessionKey()\u0027 function. A remote attacker could exploit this vulnerability to execute arbitrary code on the system by sending a specially crafted request. The following product (used in mobile devices) is affected: Qualcomm MSM8974",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "BID",
        "id": "103671"
      },
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-9179"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-9179",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "103671",
        "trust": 1.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-87140",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-9179",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "db": "BID",
        "id": "103671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "id": "VAR-201804-0075",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:39:22.588000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831 - 2018 \u5e74 4 \u6708",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/2018-04-01"
      },
      {
        "title": "Android Qualcomm Fixes for closed source component buffer error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80330"
      },
      {
        "title": "Android Security Bulletins: Android Security Bulletin\u2014April 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=068d787c35ce8cea494780f9a47b5827"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "https://source.android.com/security/bulletin/2018-04-01"
      },
      {
        "trust": 1.3,
        "url": "http://www.securityfocus.com/bid/103671"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-9179"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-9179"
      },
      {
        "trust": 0.3,
        "url": "http://code.google.com/android/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://source.android.com/security/bulletin/2018-04-01.html"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "db": "BID",
        "id": "103671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "db": "BID",
        "id": "103671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-04-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "date": "2018-04-05T00:00:00",
        "db": "BID",
        "id": "103671"
      },
      {
        "date": "2018-06-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "date": "2018-04-18T14:29:06.777000",
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-87140"
      },
      {
        "date": "2018-05-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-9179"
      },
      {
        "date": "2018-04-05T00:00:00",
        "db": "BID",
        "id": "103671"
      },
      {
        "date": "2018-06-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      },
      {
        "date": "2018-05-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      },
      {
        "date": "2024-11-21T02:39:58.623000",
        "db": "NVD",
        "id": "CVE-2015-9179"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Qualcomm Snapdragon Mobile MSM8974 Run on  Android Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-003863"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-974"
      }
    ],
    "trust": 0.6
  }
}

var-201702-0012
Vulnerability from variot

Array index error in the msm_sensor_config function in kernel/SM-G9008V_CHN_KK_Opensource/Kernel/drivers/media/platform/msm/camera_v2/sensor/msm_sensor.c in Samsung devices with Android KK(4.4) or L and an APQ8084, MSM8974, or MSM8974pro chipset allows local users to have unspecified impact via the gpio_config.gpio_name value. Samsumgandroidphone is a series of mobile phones based on the Android platform developed by South Korea's Samsung. There is a memory corruption vulnerability in the smsm_sensor_config' function in the v4l-subdev driver of samsumgandroidphone. This vulnerability is caused by the failure to perform boundary checking when the program writes gpio_config.gpio_name as an index to the buffer. An attacker could exploit this vulnerability to cause memory corruption. Samsung is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0012",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mobile",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "5.1"
      },
      {
        "model": "mobile",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "4.4"
      },
      {
        "model": "mobile",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "5.0"
      },
      {
        "model": "apq8084",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8974",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8974pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mobile",
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "samsumg android phone",
        "scope": null,
        "trust": 0.6,
        "vendor": "samsung",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:qualcomm:apq8084",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:qualcomm:msm8974",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:qualcomm:msm8974pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:samsung:mobile",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Berry Cheng.",
    "sources": [
      {
        "db": "BID",
        "id": "86366"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-4038",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-4038",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2016-02627",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2016-4038",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-4038",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-4038",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-02627",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201604-370",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Array index error in the msm_sensor_config function in kernel/SM-G9008V_CHN_KK_Opensource/Kernel/drivers/media/platform/msm/camera_v2/sensor/msm_sensor.c in Samsung devices with Android KK(4.4) or L and an APQ8084, MSM8974, or MSM8974pro chipset allows local users to have unspecified impact via the gpio_config.gpio_name value. Samsumgandroidphone is a series of mobile phones based on the Android platform developed by South Korea\u0027s Samsung. There is a memory corruption vulnerability in the smsm_sensor_config\u0027 function in the v4l-subdev driver of samsumgandroidphone. This vulnerability is caused by the failure to perform boundary checking when the program writes gpio_config.gpio_name as an index to the buffer. An attacker could exploit this vulnerability to cause memory corruption. Samsung is prone to a remote memory-corruption vulnerability. \nAttackers can exploit this issue to execute arbitrary code in the  context of the user running the affected applications. Failed exploit  attempts will likely cause a denial-of-service condition",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "BID",
        "id": "86366"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-4038",
        "trust": 3.3
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2016/04/18/8",
        "trust": 3.0
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2016/04/17/2",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "86366",
        "trust": 0.3
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "BID",
        "id": "86366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "id": "VAR-201702-0012",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:49:09Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SVE-2015-4958: msm_sensor_config security issues",
        "trust": 0.8,
        "url": "http://security.samsungmobile.com/smrupdate.html#SMR-JAN-2016"
      },
      {
        "title": "Samsumgandroidphonev4l-subdev driver memory corruption vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/74785"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.openwall.com/lists/oss-security/2016/04/18/8"
      },
      {
        "trust": 1.6,
        "url": "http://security.samsungmobile.com/smrupdate.html#smr-jan-2016"
      },
      {
        "trust": 1.6,
        "url": "http://www.openwall.com/lists/oss-security/2016/04/17/2"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4038"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4038"
      },
      {
        "trust": 0.3,
        "url": "http://www.samsung.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "BID",
        "id": "86366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "db": "BID",
        "id": "86366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "date": "2016-04-17T00:00:00",
        "db": "BID",
        "id": "86366"
      },
      {
        "date": "2017-03-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "date": "2016-04-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "date": "2017-02-01T15:59:00.223000",
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-02627"
      },
      {
        "date": "2016-04-17T00:00:00",
        "db": "BID",
        "id": "86366"
      },
      {
        "date": "2017-03-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      },
      {
        "date": "2017-02-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      },
      {
        "date": "2024-11-21T02:51:12.880000",
        "db": "NVD",
        "id": "CVE-2016-4038"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "With certain Qualcomm chipsets  Android Equipped with  Samsung Device vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007853"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201604-370"
      }
    ],
    "trust": 0.6
  }
}