René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

133 lines
4.9 KiB
JSON

{
"id": "CVE-2016-5349",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2017-04-06T19:59:00.173",
"lastModified": "2017-07-11T01:33:23.143",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The high level operating systems (HLOS) was not providing sufficient memory address information to ensure that secure applications inside Qualcomm Secure Execution Environment (QSEE) only write to legitimate memory ranges related to the QSEE secure application's HLOS client. When secure applications inside Qualcomm Secure Execution Environment (QSEE) receive memory addresses from a high level operating system (HLOS) such as Linux Android, those address have previously been verified as belonging to HLOS memory space rather than QSEE memory space, but they were not verified to be from HLOS user space rather than kernel space. This lack of verification could lead to privilege escalation within the HLOS."
},
{
"lang": "es",
"value": "Los sistemas operativos de alto nivel (HLOS) no prove\u00edan suficiente informaci\u00f3n de direcciones de memoria como para garantizar que las aplicaciones seguras dentro de Qualcomm Secure Execution Environment (QSEE) solo escriben en rangos leg\u00edtimos de memoria relacionados con el cliente de HLOS de la aplicaci\u00f3n segura de QSEE. Cuando aplicaciones seguras dentro de Qualcomm Secure Execution Environment (QSEE) reciben direcciones de memoria desde un sistema operativo de alto nivel (HLOS) como Linux Android, estas direcciones han sido verificadas previamente como pertenecientes al espacio de memoria de HLOS en lugar de espacio de memoria de QSEE, pero no se verific\u00f3 que fueran del espacio de usuario de HLOS en lugar de espacio del kernel. Esta falta de verificaci\u00f3n podr\u00eda conducir a escalada de privilegios dentro del HLOS."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.1.1",
"matchCriteriaId": "0F11609D-D1B4-4DD6-8CC7-A224344E1E67"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/97364",
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1038201",
"source": "product-security@qualcomm.com"
},
{
"url": "https://source.android.com/security/bulletin/2017-04-01",
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.codeaurora.org/insufficient-memory-address-information-prevent-arbitrary-memory-access-qsee-secure-applications-cve",
"source": "product-security@qualcomm.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://www.qualcomm.com/company/product-security/security-advisories",
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
}
]
}