ID

VAR-201608-0151


CVE

CVE-2016-3850


TITLE

plural Nexus Runs on the device Android of Qualcomm Boot loader app/aboot/aboot.c Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-004188

DESCRIPTION

Integer overflow in app/aboot/aboot.c in the Qualcomm bootloader in Android before 2016-08-05 on Nexus 5, 5X, 6P, and 7 (2013) devices allows attackers to gain privileges via a crafted header field in a boot image, aka Android internal bug 27917291 and Qualcomm internal bug CR945164. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a privilege elevation vulnerability that could allow an attacker to execute arbitrary code using elevated kernel-wide permissions. Google Nexus is prone to a privilege-escalation vulnerability. This issue is being tracked by Android Bug ID A-27917291

Trust: 2.52

sources: NVD: CVE-2016-3850 // JVNDB: JVNDB-2016-004188 // CNVD: CNVD-2016-06072 // BID: 92236 // VULMON: CVE-2016-3850

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-06072

AFFECTED PRODUCTS

vendor:googlemodel:androidscope:lteversion:6.0.1

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:2016-08-05

Trust: 0.8

vendor:googlemodel:nexusscope: - version: -

Trust: 0.6

vendor:googlemodel:androidscope:eqversion:6.0.1

Trust: 0.6

vendor:googlemodel:nexusscope:eqversion:7(2013)

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-06072 // BID: 92236 // JVNDB: JVNDB-2016-004188 // CNNVD: CNNVD-201608-027 // NVD: CVE-2016-3850

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-3850
value: HIGH

Trust: 1.0

NVD: CVE-2016-3850
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-06072
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201608-027
value: MEDIUM

Trust: 0.6

VULMON: CVE-2016-3850
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-3850
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-06072
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2016-3850
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-06072 // VULMON: CVE-2016-3850 // JVNDB: JVNDB-2016-004188 // CNNVD: CNNVD-201608-027 // NVD: CVE-2016-3850

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2016-004188 // NVD: CVE-2016-3850

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201608-027

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201608-027

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004188

PATCH

title:Android Security Bulletin-August 2016url:http://source.android.com/security/bulletin/2016-08-01.html

Trust: 0.8

title:app: aboot: check for integer overflowurl:https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=030371d45a9dcda4d0cc3c76647e753a1cc1b782

Trust: 0.8

title:Patch for GoogleNexus Privilege Escalation Vulnerability (CNVD-2016-06072)url:https://www.cnvd.org.cn/patchInfo/show/80128

Trust: 0.6

title:Android Qualcomm Bootloader Repair measures for privilege escalationurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63417

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—August 2016url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=1c52474e34daae48915f8b4129072a86

Trust: 0.1

sources: CNVD: CNVD-2016-06072 // VULMON: CVE-2016-3850 // JVNDB: JVNDB-2016-004188 // CNNVD: CNNVD-201608-027

EXTERNAL IDS

db:NVDid:CVE-2016-3850

Trust: 3.4

db:BIDid:92236

Trust: 2.0

db:JVNDBid:JVNDB-2016-004188

Trust: 0.8

db:CNVDid:CNVD-2016-06072

Trust: 0.6

db:AUSCERTid:ESB-2016.1866

Trust: 0.6

db:CNNVDid:CNNVD-201608-027

Trust: 0.6

db:VULMONid:CVE-2016-3850

Trust: 0.1

sources: CNVD: CNVD-2016-06072 // VULMON: CVE-2016-3850 // BID: 92236 // JVNDB: JVNDB-2016-004188 // CNNVD: CNNVD-201608-027 // NVD: CVE-2016-3850

REFERENCES

url:http://source.android.com/security/bulletin/2016-08-01.html

Trust: 2.1

url:https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=030371d45a9dcda4d0cc3c76647e753a1cc1b782

Trust: 2.0

url:http://www.securityfocus.com/bid/92236

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3850

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3850

Trust: 0.8

url:http://www.auscert.org.au/./render.html?it=37318

Trust: 0.6

url:http://code.google.com/android/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-06072 // VULMON: CVE-2016-3850 // BID: 92236 // JVNDB: JVNDB-2016-004188 // CNNVD: CNNVD-201608-027 // NVD: CVE-2016-3850

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 92236

SOURCES

db:CNVDid:CNVD-2016-06072
db:VULMONid:CVE-2016-3850
db:BIDid:92236
db:JVNDBid:JVNDB-2016-004188
db:CNNVDid:CNNVD-201608-027
db:NVDid:CVE-2016-3850

LAST UPDATE DATE

2025-04-13T22:08:08.600000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06072date:2016-08-05T00:00:00
db:VULMONid:CVE-2016-3850date:2016-11-28T00:00:00
db:BIDid:92236date:2016-08-01T00:00:00
db:JVNDBid:JVNDB-2016-004188date:2016-08-09T00:00:00
db:CNNVDid:CNNVD-201608-027date:2016-08-10T00:00:00
db:NVDid:CVE-2016-3850date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-06072date:2016-08-05T00:00:00
db:VULMONid:CVE-2016-3850date:2016-08-05T00:00:00
db:BIDid:92236date:2016-08-01T00:00:00
db:JVNDBid:JVNDB-2016-004188date:2016-08-09T00:00:00
db:CNNVDid:CNNVD-201608-027date:2016-08-03T00:00:00
db:NVDid:CVE-2016-3850date:2016-08-05T20:59:41.927