Huawei P8 GRA-CL00/GRA-CL10/GRA-UL00/GRA-UL10 HiFi Driver memory corruption

CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.6 | $0-$5k | 0.00 |
A vulnerability was found in Huawei P8 GRA-CL00/GRA-CL10/GRA-UL00/GRA-UL10 (Smartphone Operating System) and classified as critical. This issue affects some unknown processing of the component HiFi Driver. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Heap-based buffer overflow in the HIFI driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2015-8319.
The weakness was shared 04/07/2016 by Security Team with Alibaba Mobile Security Team (Website). The advisory is shared at huawei.com. The identification of this vulnerability is CVE-2015-8318 since 11/22/2015. An attack has to be approached locally. Required for exploitation is a simple authentication. It demands that the victim is doing some kind of user interaction. Neither technical details nor an exploit are publicly available.
Upgrading to version GRA-TL00C01B230, GRA-CL00C92B230, GRA-CL10C92B230, GRA-UL00C00B230 or GRA-UL10C00B230 eliminates this vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 80351†) and Vulnerability Center (SBV-58045†). The entries VDB-81688, VDB-81690, VDB-81692 and VDB-81693 are related to this item.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.8VulDB Meta Temp Score: 7.6
VulDB Base Score: 7.8
VulDB Temp Score: 7.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Upgrade: P8 GRA-TL00C01B230/GRA-CL00C92B230/GRA-CL10C92B230/GRA-UL00C00B230/GRA-UL10C00B230
Timeline
11/22/2015 🔍01/04/2016 🔍
01/04/2016 🔍
04/07/2016 🔍
04/07/2016 🔍
04/08/2016 🔍
04/12/2016 🔍
07/12/2022 🔍
Sources
Vendor: huawei.comAdvisory: sa-20160104-04
Researcher: Security Team
Organization: Alibaba Mobile Security Team
Status: Not defined
Confirmation: 🔍
CVE: CVE-2015-8318 (🔍)
SecurityFocus: 80351 - Huawei P8 Smart Phone Multiple Local Privilege Escalation Vulnerabilities
Vulnerability Center: 58045 - Huawei Smartphones Remote DoS and Privileges Escalation due to a Buffer Overflow in the HIFI Driver - CVE-2015-8318, High
See also: 🔍
Entry
Created: 04/08/2016 10:41 AMUpdated: 07/12/2022 10:06 AM
Changes: 04/08/2016 10:41 AM (57), 02/04/2019 10:40 AM (14), 07/12/2022 10:06 AM (3)
Complete: 🔍
Cache ID: 18:6F9:40
No comments yet. Languages: en.
Please log in to comment.