var-201803-0198
Vulnerability from variot
Huawei Mate 9 Pro smartphones with software of LON-AL00BC00B139D, LON-AL00BC00B229, LON-L29DC721B188 have a memory double free vulnerability. The system does not manage the memory properly, that frees on the same memory address twice. An attacker tricks the user who has root privilege to install a crafted application, successful exploit could result in malicious code execution. Huawei Mate 9 Pro Smartphones contain a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiMate9Pro is a smartphone from China's Huawei company. There is a memory release vulnerability in HuaweiMate9Pro
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-0198", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mate 9 pro", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "lon-al00bc00b139d" }, { "model": "mate 9 pro", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "lon-al00bc00b229" }, { "model": "mate 9 pro", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "lon-l29dc721b188" }, { "model": "mate pro lon-al00bc00b139d", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "9" }, { "model": "mate pro lon-al00bc00b229", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "9" }, { "model": "mate pro lon-l29dc721b188", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "9" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNNVD", "id": "CNNVD-201803-717" }, { "db": "NVD", "id": "CVE-2017-17320" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:huawei:mate_9_pro_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012982" } ] }, "cve": "CVE-2017-17320", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2017-17320", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2018-05336", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-108331", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-17320", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-17320", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-17320", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-05336", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201803-717", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-108331", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "VULHUB", "id": "VHN-108331" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNNVD", "id": "CNNVD-201803-717" }, { "db": "NVD", "id": "CVE-2017-17320" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Mate 9 Pro smartphones with software of LON-AL00BC00B139D, LON-AL00BC00B229, LON-L29DC721B188 have a memory double free vulnerability. The system does not manage the memory properly, that frees on the same memory address twice. An attacker tricks the user who has root privilege to install a crafted application, successful exploit could result in malicious code execution. Huawei Mate 9 Pro Smartphones contain a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiMate9Pro is a smartphone from China\u0027s Huawei company. There is a memory release vulnerability in HuaweiMate9Pro", "sources": [ { "db": "NVD", "id": "CVE-2017-17320" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "VULHUB", "id": "VHN-108331" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-17320", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2017-012982", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-717", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-05336", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-108331", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "VULHUB", "id": "VHN-108331" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNNVD", "id": "CNNVD-201803-717" }, { "db": "NVD", "id": "CVE-2017-17320" } ] }, "id": "VAR-201803-0198", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "VULHUB", "id": "VHN-108331" } ], "trust": 1.2876653 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" } ] }, "last_update_date": "2024-11-23T22:45:25.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20180314-02-smartphone", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180314-02-smartphone-en" }, { "title": "HuaweiMate9Pro memory release vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/121585" }, { "title": "Huawei Mate 9 Pro Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79317" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNNVD", "id": "CNNVD-201803-717" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-108331" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "NVD", "id": "CVE-2017-17320" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180314-02-smartphone-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17320" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17320" }, { "trust": 0.6, "url": "http://www.huawei.com/cn/psirt/security-advisories/2018/huawei-sa-20180314-02-smartphone-cn" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "VULHUB", "id": "VHN-108331" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNNVD", "id": "CNNVD-201803-717" }, { "db": "NVD", "id": "CVE-2017-17320" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-05336" }, { "db": "VULHUB", "id": "VHN-108331" }, { "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "db": "CNNVD", "id": "CNNVD-201803-717" }, { "db": "NVD", "id": "CVE-2017-17320" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-15T00:00:00", "db": "CNVD", "id": "CNVD-2018-05336" }, { "date": "2018-03-20T00:00:00", "db": "VULHUB", "id": "VHN-108331" }, { "date": "2018-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "date": "2018-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-717" }, { "date": "2018-03-20T15:29:00.470000", "db": "NVD", "id": "CVE-2017-17320" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-15T00:00:00", "db": "CNVD", "id": "CNVD-2018-05336" }, { "date": "2018-04-13T00:00:00", "db": "VULHUB", "id": "VHN-108331" }, { "date": "2018-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012982" }, { "date": "2018-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-717" }, { "date": "2024-11-21T03:17:49.870000", "db": "NVD", "id": "CVE-2017-17320" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-717" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Mate 9 Pro Vulnerability related to double release in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012982" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-717" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.