CVE-2018-9445 – Android - Directory Traversal over USB via Injection in blkid Output
https://notcve.org/view.php?id=CVE-2018-9445
In readMetadata of Utils.cpp, there is a possible path traversal bug due to a confused deputy. This could lead to local escalation of privilege when mounting a USB device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-80436257. En readMetadata de Utils.cpp, hay un posible error de salto de directorio debido a un deputy confuso. • https://www.exploit-db.com/exploits/45192 http://www.securitytracker.com/id/1041432 https://source.android.com/security/bulletin/2018-08-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-5383 – Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange
https://notcve.org/view.php?id=CVE-2018-5383
Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device. El firmware bluetooth o los controladores de software del sistema operativo en versiones de macOS anteriores a la 10.13, versiones High Sierra e iOS anteriores a la 11.4 y versiones de Android anteriores al parche del 05/06/2018, podrían no validar lo suficiente parámetros de curva elíptica empleados para generar claves públicas durante un intercambio de claves Diffie-Hellman, lo que podría permitir que un atacante remoto obtenga la clave de cifrado empleada por el dispositivo. A vulnerability in Bluetooth pairing potentially allows an attacker with physical proximity (within 30 meters) to gain unauthorized access via an adjacent network, intercept traffic and send forged pairing messages between two vulnerable Bluetooth devices. This may result in information disclosure, elevation of privilege and/or denial of service. • http://www.cs.technion.ac.il/~biham/BT http://www.securityfocus.com/bid/104879 http://www.securitytracker.com/id/1041432 https://access.redhat.com/errata/RHSA-2019:2169 https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html https://usn.ubuntu.com/4094-1 https://usn.ubuntu.com/4095-1 https://usn.ubuntu.com/4095-2 https://usn.ubuntu.com/4118-1 https://usn.ubuntu.com/4351-1 https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig- • CWE-325: Missing Cryptographic Step CWE-347: Improper Verification of Cryptographic Signature •
CVE-2018-14066
https://notcve.org/view.php?id=CVE-2018-14066
The content://wappush content provider in com.android.provider.telephony, as found in some custom ROMs for Android phones, allows SQL injection. One consequence is that an application without the READ_SMS permission can read SMS messages. This affects Infinix X571 phones, as well as various Lenovo phones (such as the A7020) that have since been fixed by Lenovo. El proveedor de contenidos content://wappush en com.android.provider.telephony, tal y como se encuentra en algunas ROM personalizadas para teléfonos Android, permite la inyección SQL. Una consecuencia es que una aplicación sin el permiso READ_SMS puede leer mensajes SMS. • https://hacked0x90.wordpress.com/2018/07/12/lenovo-infinix-sql-injection-to-mobile-sms-leakage • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-5907
https://notcve.org/view.php?id=CVE-2018-5907
Possible buffer overflow in msm_adsp_stream_callback_put due to lack of input validation of user-provided data that leads to integer overflow in all Android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the Linux kernel. Posible desbordamiento de búfer en msm_adsp_stream_callback_put debido a la falta de validación de entradas de datos proporcionados por el usuario que conduce a un desbordamiento de enteros en todas las distribuciones de Android (Android for MSM, Firefox OS for MSM y QRD Android) desde CAF que emplean el kernel de Linux. • https://source.android.com/security/bulletin/pixel/2018-07-01#qualcomm-components https://www.vulnerabilitycenter.com/#%21vul=87341 • CWE-190: Integer Overflow or Wraparound •
CVE-2018-11304
https://notcve.org/view.php?id=CVE-2018-11304
Possible buffer overflow in msm_adsp_stream_callback_put due to lack of input validation of user-provided data that leads to integer overflow in all Android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the Linux kernel. Posible desbordamiento de búfer en msm_adsp_stream_callback_put debido a la falta de validación de entradas de datos proporcionados por el usuario que conduce a un desbordamiento de enteros en todas las distribuciones de Android (Android for MSM, Firefox OS for MSM y QRD Android) desde CAF que emplean el kernel de Linux. • https://source.android.com/security/bulletin/pixel/2018-07-01#qualcomm-components https://www.vulnerabilitycenter.com/#%21vul=87338 • CWE-190: Integer Overflow or Wraparound •