2019-01-04 09:04:41 -05:00
{
2019-12-14 00:00:59 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
2019-03-17 23:03:10 +00:00
"CVE_data_meta" : {
"ID" : "CVE-2019-5235" ,
2019-12-14 00:00:59 +00:00
"ASSIGNER" : "psirt@huawei.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B" ,
"version" : {
"version_data" : [
{
"version_value" : "Version"
} ,
{
"version_value" : "9.1.0.206(C00E205R3P1)"
} ,
{
"version_value" : "9.0.1.5(C735R1)"
} ,
{
"version_value" : "9.1.0.1(C00R3)"
} ,
{
"version_value" : "9.1.0.206(C00E205R3P1)"
} ,
{
"version_value" : "9.1.0.206"
} ,
{
"version_value" : "9.0.1.162(C01E160R2P3)"
} ,
{
"version_value" : "8.2.0.170(C861)"
} ,
{
"version_value" : "8.2.0.188(C00R2P1)"
} ,
{
"version_value" : "8.2.0.163(C605)"
} ,
{
"version_value" : "8.2.0.160(C185)"
} ,
{
"version_value" : "8.2.0.156(C636R2P2)"
} ,
{
"version_value" : "8.2.0.152(C45CUSTC45D1)"
} ,
{
"version_value" : "8.2.0.162(C605)"
} ,
{
"version_value" : "8.2.0.175(C00R2P4)"
} ,
{
"version_value" : "8.2.0.190(C788R1P16)"
} ,
{
"version_value" : "8.2.0.161(C675CUSTC675D1)"
} ,
{
"version_value" : "8.2.0.165(C00R1P16)"
} ,
{
"version_value" : "8.2.0.130(C461R1P1)"
} ,
{
"version_value" : "8.2.0.130(C652CUSTC652D1)"
} ,
{
"version_value" : "8.2.0.131(C10R2P2)"
} ,
{
"version_value" : "8.2.0.136(C432CUSTC432D1)"
} ,
{
"version_value" : "8.2.0.101(C10CUSTC10D1)"
} ,
{
"version_value" : "8.2.0.101(C432CUSTC432D1)"
} ,
{
"version_value" : "8.2.0.131(C55CUSTC55D1)"
} ,
{
"version_value" : "8.2.0.105(C185R1P1)"
} ,
{
"version_value" : "8.2.0.107(C636R2P1)"
} ,
{
"version_value" : "8.2.0.103(C652CUSTC652D1)"
} ,
{
"version_value" : "8.2.0.105(C185R2P1)"
} ,
{
"version_value" : "8.2.0.107(C636R2P1)"
} ,
{
"version_value" : "8.2.0.130(C636CUSTC636D2)"
} ,
{
"version_value" : "8.2.0.133(C605CUSTC605D1)"
} ,
{
"version_value" : "8.2.0.155(C675R2P1)"
} ,
{
"version_value" : "8.2.0.155(C675R2P1)"
} ,
{
"version_value" : "8.2.0.110(C652CUSTC652D1)"
} ,
{
"version_value" : "8.2.0.155(C675R2P1)"
} ,
{
"version_value" : "8.2.0.100(C541CUSTC541D1)"
} ,
{
"version_value" : "8.2.0.165(C01R1P16)"
} ,
{
"version_value" : "8.2.0.100(C541CUSTC541D1)"
} ,
{
"version_value" : "9.1.0.208(C00E205R3P1)"
} ,
{
"version_value" : "9.1.0.208(C00E205R3P1)"
} ,
{
"version_value" : "9.1.0.162(C00E160R2P1)"
} ,
{
"version_value" : "9.1.0.12(C00R1)"
} ,
{
"version_value" : "9.1.0.4(C735R1)"
} ,
{
"version_value" : "9.1.0.162(C00E160R2P1)"
} ,
{
"version_value" : "9.1.0.12(C00R1)"
} ,
{
"version_value" : "9.1.0.162"
} ,
{
"version_value" : "9.1.0.161"
} ,
{
"version_value" : "9.1.0.162(C01E160R2P1)"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "null pointer dereference"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" ,
"url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en"
}
]
2019-03-17 23:03:10 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2019-12-14 00:00:59 +00:00
"value" : "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal."
2019-03-17 23:03:10 +00:00
}
]
}
}