Lucene search

K
cve[email protected]CVE-2018-11292
HistorySep 20, 2018 - 1:29 p.m.

CVE-2018-11292

2018-09-2013:29:01
CWE-787
CWE-190
web.nvd.nist.gov
28
snapdragon
cve-2018-11292
input validation
wlanwmi
integer overflow
heap overflow
security advisory

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.1%

In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, lack of input validation in WLANWMI command handlers can lead to integer & heap overflows.

Affected configurations

NVD
Node
qualcommmdm9206_firmwareMatch-
AND
qualcommmdm9206Match-
Node
qualcommmdm9607_firmwareMatch-
AND
qualcommmdm9607Match-
Node
qualcommmdm9640_firmwareMatch-
AND
qualcommmdm9640Match-
Node
qualcommmdm9650_firmwareMatch-
AND
qualcommmdm9650Match-
Node
qualcommmsm8909w_firmwareMatch-
AND
qualcommmsm8909wMatch-
Node
qualcommmsm8996auMatch-
AND
qualcommmsm8996au_firmwareMatch-
Node
qualcommqca6574auMatch-
AND
qualcommqca6574au_firmwareMatch-
Node
qualcommqca6584Match-
AND
qualcommqca6584_firmwareMatch-
Node
qualcommsd210Match-
AND
qualcommsd210_firmwareMatch-
Node
qualcommsd212Match-
AND
qualcommsd212_firmwareMatch-
Node
qualcommsd205Match-
AND
qualcommsd205_firmwareMatch-
Node
qualcommsd410Match-
AND
qualcommsd410_firmwareMatch-
Node
qualcommsd412Match-
AND
qualcommsd412_firmwareMatch-
Node
qualcommsd425_firmwareMatch-
AND
qualcommsd425Match-
Node
qualcommsd427_firmwareMatch-
AND
qualcommsd427Match-
Node
qualcommsd430_firmwareMatch-
AND
qualcommsd430Match-
Node
qualcommsd450_firmwareMatch-
AND
qualcommsd450Match-
Node
qualcommsd615_firmwareMatch-
AND
qualcommsd615Match-
Node
qualcommsd616_firmwareMatch-
AND
qualcommsd616Match-
Node
qualcommsd415_firmwareMatch-
AND
qualcommsd415Match-
Node
qualcommsd625_firmwareMatch-
AND
qualcommsd625Match-
Node
qualcommsd650_firmwareMatch-
AND
qualcommsd650Match-
Node
qualcommsd652_firmwareMatch-
AND
qualcommsd652Match-
Node
qualcommsd820a_firmwareMatch-
AND
qualcommsd820aMatch-
Node
qualcommsdm429_firmwareMatch-
AND
qualcommsdm429Match-
Node
qualcommsdm439_firmwareMatch-
AND
qualcommsdm439Match-
Node
qualcommsdm630_firmwareMatch-
AND
qualcommsdm630Match-
Node
qualcommsdm632_firmwareMatch-
AND
qualcommsdm632Match-
Node
qualcommsdm636_firmwareMatch-
AND
qualcommsdm636Match-
Node
qualcommsdm660_firmwareMatch-
AND
qualcommsdm660Match-

CNA Affected

[
  {
    "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.1%

Related for CVE-2018-11292