Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-5wgx-97x6-5q43
Vulnerability from github
Published
2022-05-24 17:03
Modified
2022-05-24 17:03
Details
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
{ "affected": [], "aliases": [ "CVE-2019-5235" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-12-14T00:15:00Z", "severity": "MODERATE" }, "details": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.", "id": "GHSA-5wgx-97x6-5q43", "modified": "2022-05-24T17:03:40Z", "published": "2022-05-24T17:03:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5235" }, { "type": "WEB", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ], "schema_version": "1.4.0", "severity": [] }
cve-2019-5235
Vulnerability from cvelistv5
Published
2019-12-13 23:09
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B |
Version: Version Version: 9.1.0.206(C00E205R3P1) Version: 9.0.1.5(C735R1) Version: 9.1.0.1(C00R3) Version: 9.1.0.206 Version: 9.0.1.162(C01E160R2P3) Version: 8.2.0.170(C861) Version: 8.2.0.188(C00R2P1) Version: 8.2.0.163(C605) Version: 8.2.0.160(C185) Version: 8.2.0.156(C636R2P2) Version: 8.2.0.152(C45CUSTC45D1) Version: 8.2.0.162(C605) Version: 8.2.0.175(C00R2P4) Version: 8.2.0.190(C788R1P16) Version: 8.2.0.161(C675CUSTC675D1) Version: 8.2.0.165(C00R1P16) Version: 8.2.0.130(C461R1P1) Version: 8.2.0.130(C652CUSTC652D1) Version: 8.2.0.131(C10R2P2) Version: 8.2.0.136(C432CUSTC432D1) Version: 8.2.0.101(C10CUSTC10D1) Version: 8.2.0.101(C432CUSTC432D1) Version: 8.2.0.131(C55CUSTC55D1) Version: 8.2.0.105(C185R1P1) Version: 8.2.0.107(C636R2P1) Version: 8.2.0.103(C652CUSTC652D1) Version: 8.2.0.105(C185R2P1) Version: 8.2.0.130(C636CUSTC636D2) Version: 8.2.0.133(C605CUSTC605D1) Version: 8.2.0.155(C675R2P1) Version: 8.2.0.110(C652CUSTC652D1) Version: 8.2.0.100(C541CUSTC541D1) Version: 8.2.0.165(C01R1P16) Version: 9.1.0.208(C00E205R3P1) Version: 9.1.0.162(C00E160R2P1) Version: 9.1.0.12(C00R1) Version: 9.1.0.4(C735R1) Version: 9.1.0.162 Version: 9.1.0.161 Version: 9.1.0.162(C01E160R2P1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Version" }, { "status": "affected", "version": "9.1.0.206(C00E205R3P1)" }, { "status": "affected", "version": "9.0.1.5(C735R1)" }, { "status": "affected", "version": "9.1.0.1(C00R3)" }, { "status": "affected", "version": "9.1.0.206" }, { "status": "affected", "version": "9.0.1.162(C01E160R2P3)" }, { "status": "affected", "version": "8.2.0.170(C861)" }, { "status": "affected", "version": "8.2.0.188(C00R2P1)" }, { "status": "affected", "version": "8.2.0.163(C605)" }, { "status": "affected", "version": "8.2.0.160(C185)" }, { "status": "affected", "version": "8.2.0.156(C636R2P2)" }, { "status": "affected", "version": "8.2.0.152(C45CUSTC45D1)" }, { "status": "affected", "version": "8.2.0.162(C605)" }, { "status": "affected", "version": "8.2.0.175(C00R2P4)" }, { "status": "affected", "version": "8.2.0.190(C788R1P16)" }, { "status": "affected", "version": "8.2.0.161(C675CUSTC675D1)" }, { "status": "affected", "version": "8.2.0.165(C00R1P16)" }, { "status": "affected", "version": "8.2.0.130(C461R1P1)" }, { "status": "affected", "version": "8.2.0.130(C652CUSTC652D1)" }, { "status": "affected", "version": "8.2.0.131(C10R2P2)" }, { "status": "affected", "version": "8.2.0.136(C432CUSTC432D1)" }, { "status": "affected", "version": "8.2.0.101(C10CUSTC10D1)" }, { "status": "affected", "version": "8.2.0.101(C432CUSTC432D1)" }, { "status": "affected", "version": "8.2.0.131(C55CUSTC55D1)" }, { "status": "affected", "version": "8.2.0.105(C185R1P1)" }, { "status": "affected", "version": "8.2.0.107(C636R2P1)" }, { "status": "affected", "version": "8.2.0.103(C652CUSTC652D1)" }, { "status": "affected", "version": "8.2.0.105(C185R2P1)" }, { "status": "affected", "version": "8.2.0.130(C636CUSTC636D2)" }, { "status": "affected", "version": "8.2.0.133(C605CUSTC605D1)" }, { "status": "affected", "version": "8.2.0.155(C675R2P1)" }, { "status": "affected", "version": "8.2.0.110(C652CUSTC652D1)" }, { "status": "affected", "version": "8.2.0.100(C541CUSTC541D1)" }, { "status": "affected", "version": "8.2.0.165(C01R1P16)" }, { "status": "affected", "version": "9.1.0.208(C00E205R3P1)" }, { "status": "affected", "version": "9.1.0.162(C00E160R2P1)" }, { "status": "affected", "version": "9.1.0.12(C00R1)" }, { "status": "affected", "version": "9.1.0.4(C735R1)" }, { "status": "affected", "version": "9.1.0.162" }, { "status": "affected", "version": "9.1.0.161" }, { "status": "affected", "version": "9.1.0.162(C01E160R2P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T23:09:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B", "version": { "version_data": [ { "version_value": "Version" }, { "version_value": "9.1.0.206(C00E205R3P1)" }, { "version_value": "9.0.1.5(C735R1)" }, { "version_value": "9.1.0.1(C00R3)" }, { "version_value": "9.1.0.206(C00E205R3P1)" }, { "version_value": "9.1.0.206" }, { "version_value": "9.0.1.162(C01E160R2P3)" }, { "version_value": "8.2.0.170(C861)" }, { "version_value": "8.2.0.188(C00R2P1)" }, { "version_value": "8.2.0.163(C605)" }, { "version_value": "8.2.0.160(C185)" }, { "version_value": "8.2.0.156(C636R2P2)" }, { "version_value": "8.2.0.152(C45CUSTC45D1)" }, { "version_value": "8.2.0.162(C605)" }, { "version_value": "8.2.0.175(C00R2P4)" }, { "version_value": "8.2.0.190(C788R1P16)" }, { "version_value": "8.2.0.161(C675CUSTC675D1)" }, { "version_value": "8.2.0.165(C00R1P16)" }, { "version_value": "8.2.0.130(C461R1P1)" }, { "version_value": "8.2.0.130(C652CUSTC652D1)" }, { "version_value": "8.2.0.131(C10R2P2)" }, { "version_value": "8.2.0.136(C432CUSTC432D1)" }, { "version_value": "8.2.0.101(C10CUSTC10D1)" }, { "version_value": "8.2.0.101(C432CUSTC432D1)" }, { "version_value": "8.2.0.131(C55CUSTC55D1)" }, { "version_value": "8.2.0.105(C185R1P1)" }, { "version_value": "8.2.0.107(C636R2P1)" }, { "version_value": "8.2.0.103(C652CUSTC652D1)" }, { "version_value": "8.2.0.105(C185R2P1)" }, { "version_value": "8.2.0.107(C636R2P1)" }, { "version_value": "8.2.0.130(C636CUSTC636D2)" }, { "version_value": "8.2.0.133(C605CUSTC605D1)" }, { "version_value": "8.2.0.155(C675R2P1)" }, { "version_value": "8.2.0.155(C675R2P1)" }, { "version_value": "8.2.0.110(C652CUSTC652D1)" }, { "version_value": "8.2.0.155(C675R2P1)" }, { "version_value": "8.2.0.100(C541CUSTC541D1)" }, { "version_value": "8.2.0.165(C01R1P16)" }, { "version_value": "8.2.0.100(C541CUSTC541D1)" }, { "version_value": "9.1.0.208(C00E205R3P1)" }, { "version_value": "9.1.0.208(C00E205R3P1)" }, { "version_value": "9.1.0.162(C00E160R2P1)" }, { "version_value": "9.1.0.12(C00R1)" }, { "version_value": "9.1.0.4(C735R1)" }, { "version_value": "9.1.0.162(C00E160R2P1)" }, { "version_value": "9.1.0.12(C00R1)" }, { "version_value": "9.1.0.162" }, { "version_value": "9.1.0.161" }, { "version_value": "9.1.0.162(C01E160R2P1)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5235", "datePublished": "2019-12-13T23:09:32", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.