Vulnerability Name: | CVE-2019-10541 (CCN-171068) |
Assigned: | 2019-09-01 |
Published: | 2019-09-01 |
Updated: | 2021-07-21 |
Summary: | Dereference on uninitialized buffer can happen when parsing FLV clip with corrupted codec specific data in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 600, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20
|
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: Google Web site Android
Source: MITRE Type: CNA CVE-2019-10541
Source: XF Type: UNKNOWN android-cve201910541-weak-security(171068)
Source: CONFIRM Type: Vendor Advisory https://source.android.com/security/bulletin/
Source: CCN Type: Android Open Source Project Android Security Bulletin—September 2019
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9206:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9607:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8909w:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca6574au:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs405:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs605:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_210:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_212:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_205:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_425:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_439:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_429:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_450:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_600:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_625:-:*:*:*:*:*:*:* Configuration 18: cpe:/o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_632:-:*:*:*:*:*:*:* Configuration 19: cpe:/o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_636:-:*:*:*:*:*:*:* Configuration 20: cpe:/o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_665:-:*:*:*:*:*:*:* Configuration 21: cpe:/o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_675:-:*:*:*:*:*:*:* Configuration 22: cpe:/o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_712:-:*:*:*:*:*:*:* Configuration 23: cpe:/o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_710:-:*:*:*:*:*:*:* Configuration 24: cpe:/o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_670:-:*:*:*:*:*:*:* Configuration 25: cpe:/o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_730:-:*:*:*:*:*:*:* Configuration 26: cpe:/o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_820:-:*:*:*:*:*:*:* Configuration 27: cpe:/o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_820a:-:*:*:*:*:*:*:* Configuration 28: cpe:/o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_835:-:*:*:*:*:*:*:* Configuration 29: cpe:/o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_845:-:*:*:*:*:*:*:* Configuration 30: cpe:/o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_850:-:*:*:*:*:*:*:* Configuration 31: cpe:/o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_855:-:*:*:*:*:*:*:* Configuration 32: cpe:/o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sda660:-:*:*:*:*:*:*:* Configuration 33: cpe:/o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm439:-:*:*:*:*:*:*:* Configuration 34: cpe:/o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm630:-:*:*:*:*:*:*:* Configuration 35: cpe:/o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm660:-:*:*:*:*:*:*:* Configuration 36: cpe:/o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdx20:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:google:android:*:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
qualcomm mdm9206 firmware -
qualcomm mdm9206 -
qualcomm mdm9607 firmware -
qualcomm mdm9607 -
qualcomm msm8909w firmware -
qualcomm msm8909w -
qualcomm msm8996au firmware -
qualcomm msm8996au -
qualcomm qca6574au firmware -
qualcomm qca6574au -
qualcomm qcs405 firmware -
qualcomm qcs405 -
qualcomm qcs605 firmware -
qualcomm qcs605 -
qualcomm qualcomm 215 firmware -
qualcomm qualcomm 215 -
qualcomm sd 210 firmware -
qualcomm sd 210 -
qualcomm sd 212 firmware -
qualcomm sd 212 -
qualcomm sd 205 firmware -
qualcomm sd 205 -
qualcomm sd 425 firmware -
qualcomm sd 425 -
qualcomm sd 439 firmware -
qualcomm sd 439 -
qualcomm sd 429 firmware -
qualcomm sd 429 -
qualcomm sd 450 firmware -
qualcomm sd 450 -
qualcomm sd 600 firmware -
qualcomm sd 600 -
qualcomm sd 625 firmware -
qualcomm sd 625 -
qualcomm sd 632 firmware -
qualcomm sd 632 -
qualcomm sd 636 firmware -
qualcomm sd 636 -
qualcomm sd 665 firmware -
qualcomm sd 665 -
qualcomm sd 675 firmware -
qualcomm sd 675 -
qualcomm sd 712 firmware -
qualcomm sd 712 -
qualcomm sd 710 firmware -
qualcomm sd 710 -
qualcomm sd 670 firmware -
qualcomm sd 670 -
qualcomm sd 730 firmware -
qualcomm sd 730 -
qualcomm sd 820 firmware -
qualcomm sd 820 -
qualcomm sd 820a firmware -
qualcomm sd 820a -
qualcomm sd 835 firmware -
qualcomm sd 835 -
qualcomm sd 845 firmware -
qualcomm sd 845 -
qualcomm sd 850 firmware -
qualcomm sd 850 -
qualcomm sd 855 firmware -
qualcomm sd 855 -
qualcomm sda660 firmware -
qualcomm sda660 -
qualcomm sdm439 firmware -
qualcomm sdm439 -
qualcomm sdm630 firmware -
qualcomm sdm630 -
qualcomm sdm660 firmware -
qualcomm sdm660 -
qualcomm sdx20 firmware -
qualcomm sdx20 -
google android *