2024-11-28 01:01:52 +00:00
{
"id" : "CVE-2018-9374" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2024-11-28T00:15:03.827" ,
2024-12-18 21:03:42 +00:00
"lastModified" : "2024-12-18T20:25:33.723" ,
"vulnStatus" : "Analyzed" ,
2024-11-28 01:01:52 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In installPackageLI of PackageManagerService.java, there is a possible\u00a0permissions bypass. This could lead to local escalation of privilege with\u00a0User execution privileges needed. User interaction is not needed for\u00a0exploitation."
2024-11-29 23:04:19 +00:00
} ,
{
"lang" : "es" ,
"value" : "En installPackageLI de PackageManagerService.java, existe una posible omisi\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del usuario. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-12-18 21:03:42 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2024-11-29 23:04:19 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-12-18 21:03:42 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
} ,
2024-11-29 23:04:19 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-863"
}
]
2024-11-28 01:01:52 +00:00
}
] ,
2024-12-18 21:03:42 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "691FA41B-C2CE-413F-ABB1-0B22CB322807"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D835D592-2423-44C6-804A-3AD010112E7C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "568E2561-A068-46A2-B331-BBA91FC96F0C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
] ,
2024-11-28 01:01:52 +00:00
"references" : [
{
"url" : "https://source.android.com/docs/security/bulletin/pixel/2018-06-01" ,
2024-12-18 21:03:42 +00:00
"source" : "security@android.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-28 01:01:52 +00:00
}
]
}