ID

VAR-201610-0234


CVE

CVE-2016-3918


TITLE

Android of AOSP Mail of email/provider/AttachmentProvider.java Vulnerable to reading arbitrary attachments

Trust: 0.8

sources: JVNDB: JVNDB-2016-005248

DESCRIPTION

email/provider/AttachmentProvider.java in AOSP Mail in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 does not ensure that certain values are integers, which allows attackers to read arbitrary attachments via a crafted application that provides a pathname value, aka internal bug 30745403. Google Android is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain potentially sensitive information. Information obtained may aid in further attacks. This issue is being tracked by Android Bug ID A-30745403. Android 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, and 7.0 are vulnerable

Trust: 1.98

sources: NVD: CVE-2016-3918 // JVNDB: JVNDB-2016-005248 // BID: 93299 // VULMON: CVE-2016-3918

AFFECTED PRODUCTS

vendor:googlemodel:androidscope:eqversion:4.1

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.2

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.4

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.3.1

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.0.3

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.0.4

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.1.2

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.4.3

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.2.2

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:4.3

Trust: 1.6

vendor:googlemodel:androidscope:eqversion:6.0.1

Trust: 1.3

vendor:googlemodel:androidscope:eqversion:7.0

Trust: 1.3

vendor:googlemodel:androidscope:eqversion:6.0

Trust: 1.3

vendor:googlemodel:androidscope:eqversion:5.1.1

Trust: 1.1

vendor:googlemodel:androidscope:eqversion:5.0.2

Trust: 1.1

vendor:googlemodel:androidscope:eqversion:4.4.4

Trust: 1.1

vendor:googlemodel:androidscope:eqversion:4.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:5.0.1

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:5.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:5.1.0

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:4.0.2

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:4.0.1

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:4.4.2

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:5.1

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:4.4.1

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:4.2.1

Trust: 1.0

vendor:googlemodel:androidscope:ltversion:2016-10-01 earlier 6.x

Trust: 0.8

vendor:googlemodel:androidscope:ltversion:5.0.x

Trust: 0.8

vendor:googlemodel:androidscope:ltversion:5.1.x

Trust: 0.8

vendor:googlemodel:androidscope:ltversion:2016-10-01 earlier 7.0

Trust: 0.8

vendor:googlemodel:androidscope:ltversion:4.x

Trust: 0.8

vendor:huaweimodel:p9 eva-tl10c00b193scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-tl10c00b192scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-tl10c00b190scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-tl10c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-dl10c00b193scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-dl10c00b192scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-dl10c00b190scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-dl10c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-cl10c00b193scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-cl10c00b192scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-cl10c00b190scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-cl10c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-al10c00b193scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-al10c00b192scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-al10c00b190scope: - version: -

Trust: 0.3

vendor:huaweimodel:p9 eva-al10c00scope: - version: -

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:7(2013)

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5

Trust: 0.3

vendor:googlemodel:android onescope:eqversion:0

Trust: 0.3

vendor:huaweimodel:p9 eva-tl10c00b195scope:neversion: -

Trust: 0.3

vendor:huaweimodel:p9 eva-dl10c00b195scope:neversion: -

Trust: 0.3

vendor:huaweimodel:p9 eva-cl10c00b195scope:neversion: -

Trust: 0.3

vendor:huaweimodel:p9 eva-al10c00b195scope:neversion: -

Trust: 0.3

sources: BID: 93299 // JVNDB: JVNDB-2016-005248 // CNNVD: CNNVD-201610-178 // NVD: CVE-2016-3918

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-3918
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-3918
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201610-178
value: MEDIUM

Trust: 0.6

VULMON: CVE-2016-3918
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-3918
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2016-3918
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULMON: CVE-2016-3918 // JVNDB: JVNDB-2016-005248 // CNNVD: CNNVD-201610-178 // NVD: CVE-2016-3918

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2016-005248 // NVD: CVE-2016-3918

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-178

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201610-178

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005248

PATCH

title:Limit account id and id to longsurl:https://android.googlesource.com/platform/packages/apps/Email/+/6b2b0bd7c771c698f11d7be89c2c57c8722c7454

Trust: 0.8

title:Android Security Bulletin-October 2016url:http://source.android.com/security/bulletin/2016-10-01.html

Trust: 0.8

title:Android AOSP Mail Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64583

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—October 2016url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=66399e39e6fd5b04e559a1f773ff4e37

Trust: 0.1

sources: VULMON: CVE-2016-3918 // JVNDB: JVNDB-2016-005248 // CNNVD: CNNVD-201610-178

EXTERNAL IDS

db:NVDid:CVE-2016-3918

Trust: 2.8

db:BIDid:93299

Trust: 1.4

db:JVNDBid:JVNDB-2016-005248

Trust: 0.8

db:CNNVDid:CNNVD-201610-178

Trust: 0.6

db:VULMONid:CVE-2016-3918

Trust: 0.1

sources: VULMON: CVE-2016-3918 // BID: 93299 // JVNDB: JVNDB-2016-005248 // CNNVD: CNNVD-201610-178 // NVD: CVE-2016-3918

REFERENCES

url:http://source.android.com/security/bulletin/2016-10-01.html

Trust: 2.0

url:https://android.googlesource.com/platform/packages/apps/email/+/6b2b0bd7c771c698f11d7be89c2c57c8722c7454

Trust: 1.7

url:http://www.securityfocus.com/bid/93299

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3918

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3918

Trust: 0.8

url:http://www.android.com/

Trust: 0.3

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161214-01-smartphone-en

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=49185

Trust: 0.1

sources: VULMON: CVE-2016-3918 // BID: 93299 // JVNDB: JVNDB-2016-005248 // CNNVD: CNNVD-201610-178 // NVD: CVE-2016-3918

CREDITS

Wenlin Yang and Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd

Trust: 0.3

sources: BID: 93299

SOURCES

db:VULMONid:CVE-2016-3918
db:BIDid:93299
db:JVNDBid:JVNDB-2016-005248
db:CNNVDid:CNNVD-201610-178
db:NVDid:CVE-2016-3918

LAST UPDATE DATE

2025-04-13T23:39:30.946000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2016-3918date:2016-11-28T00:00:00
db:BIDid:93299date:2016-12-20T08:10:00
db:JVNDBid:JVNDB-2016-005248date:2016-10-14T00:00:00
db:CNNVDid:CNNVD-201610-178date:2016-10-12T00:00:00
db:NVDid:CVE-2016-3918date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULMONid:CVE-2016-3918date:2016-10-10T00:00:00
db:BIDid:93299date:2016-10-03T00:00:00
db:JVNDBid:JVNDB-2016-005248date:2016-10-14T00:00:00
db:CNNVDid:CNNVD-201610-178date:2016-10-12T00:00:00
db:NVDid:CVE-2016-3918date:2016-10-10T10:59:22.980