2024-12-05 00:58:31 +00:00
{
"id" : "CVE-2018-9404" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2024-12-05T00:15:17.860" ,
2024-12-19 17:03:45 +00:00
"lastModified" : "2024-12-19T16:39:46.807" ,
"vulnStatus" : "Analyzed" ,
2024-12-05 00:58:31 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In oemCallback of ril.cpp, there is a possible out of bounds write due to an\n integer overflow. This could lead to local escalation of privilege with\n System execution privileges needed. User interaction is not needed for\n exploitation."
2024-12-06 10:02:12 +00:00
} ,
{
"lang" : "es" ,
"value" : "En oemCallback de ril.cpp, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-12-19 17:03:45 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.9
} ,
2024-12-06 10:02:12 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-12-19 17:03:45 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-190"
}
]
} ,
2024-12-06 10:02:12 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
2024-12-05 00:58:31 +00:00
}
] ,
2024-12-19 17:03:45 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
] ,
2024-12-05 00:58:31 +00:00
"references" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2018-06-01" ,
2024-12-19 17:03:45 +00:00
"source" : "security@android.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-05 00:58:31 +00:00
}
]
}