VAR-201609-0181
Vulnerability from variot - Updated: 2023-12-18 12:57The video driver in Huawei Mate S smartphones with software CRR-TL00 before CRR-TL00C01B362, CRR-UL20 before CRR-UL20C00B362, CRR-CL00 before CRR-CL00C92B362, and CRR-CL20 before CRR-CL20C92B362; P8 smartphones with software GRA-TL00 before GRA-TL00C01B366, GRA-UL00 before GRA-UL00C00B366, GRA-UL10 before GRA-UL10C00B366, and GRA-CL00 before GRA-CL00C92B366; and Honor 6 and Honor 6 Plus smartphones with software before 6.9.16 allows attackers to cause a denial of service (device reboot) via a crafted application. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( Reboot device ) There is a possibility of being put into a state. HuaweiMateS is a smartphone product of China Huawei. Video drivers in various Huawei smartphones have security vulnerabilities that allow remote attackers to exploit vulnerabilities to pass specific parameters to mobile phones through malicious applications for denial of service attacks. Huawei Smart Phone is prone to a local denial-of-service vulnerability. A local attacker can exploit this issue to cause a denial-of-service condition. The following products are vulnerable: Versions of Mate S and P8 before CRR-TL00C01B362 are affected. Versions of Hono6 and Honor6 Plus prior to 6.9.16 are affected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0181",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-cl20"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-ul10"
},
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-ul20"
},
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-tl00"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-cl00"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-ul00"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-tl00"
},
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-cl00"
},
{
"model": "honor6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "6.9"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-tl00c01b362"
},
{
"model": "honor 6 plus",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-cl00"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl20"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-cl00c92b366"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl00"
},
{
"model": "honor 6",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-tl00"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl20c92b362"
},
{
"model": "mate s",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul00"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-tl00"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul00c00b366"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-tl00c01b366"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-ul20c00b362"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl00c92b362"
},
{
"model": "p8",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul10"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-ul20"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul10c00b366"
},
{
"model": "mate s \u003ccrr-tl00c01b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "mate s \u003ccrr-ul20c00b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "mate s \u003ccrr-cl00c92b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "mate s \u003ccrr-cl20c92b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-tl00c01b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-ul00c00b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-ul10c00b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-cl00c92b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "glory",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6\u003c6.9.16"
},
{
"model": "glory plus",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6\u003c6.9.16"
},
{
"model": "honor6",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6.9"
},
{
"model": "p8 gra-ul10c00b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul10c00b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b182",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b220sp01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b182",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl10c92b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl10c92b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl10c92b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b363",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b182",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-ul00c00b160",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-ul00c00b153",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-tl00c01b160sp01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-tl00c01b153sp01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-cl00c92b161",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-cl00c92b153",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 plus",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "honor6 h60-l21c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l12c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l11c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l03c01b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l02c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l01c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 crr-tl00c01b362",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-tl00c01b362",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 plus",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "6.9.16"
},
{
"model": "honor6",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "6.9.16"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-cl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-ul10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-ul00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-tl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-cl20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-cl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-ul20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-tl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:honor6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:honor6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:honor6_plus:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8279"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Wang Qize, Zhu Bin of VPP Security Team and PanYu of 360 Vulpecker Team.",
"sources": [
{
"db": "BID",
"id": "93096"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
],
"trust": 0.9
},
"cve": "CVE-2016-8279",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.1,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8279",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-08186",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-97099",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 5.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8279",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-8279",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2016-08186",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-500",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-97099",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The video driver in Huawei Mate S smartphones with software CRR-TL00 before CRR-TL00C01B362, CRR-UL20 before CRR-UL20C00B362, CRR-CL00 before CRR-CL00C92B362, and CRR-CL20 before CRR-CL20C92B362; P8 smartphones with software GRA-TL00 before GRA-TL00C01B366, GRA-UL00 before GRA-UL00C00B366, GRA-UL10 before GRA-UL10C00B366, and GRA-CL00 before GRA-CL00C92B366; and Honor 6 and Honor 6 Plus smartphones with software before 6.9.16 allows attackers to cause a denial of service (device reboot) via a crafted application. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( Reboot device ) There is a possibility of being put into a state. HuaweiMateS is a smartphone product of China Huawei. Video drivers in various Huawei smartphones have security vulnerabilities that allow remote attackers to exploit vulnerabilities to pass specific parameters to mobile phones through malicious applications for denial of service attacks. Huawei Smart Phone is prone to a local denial-of-service vulnerability. \nA local attacker can exploit this issue to cause a denial-of-service condition. \nThe following products are vulnerable:\nVersions of Mate S and P8 before CRR-TL00C01B362 are affected. \nVersions of Hono6 and Honor6 Plus prior to 6.9.16 are affected",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "VULHUB",
"id": "VHN-97099"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8279",
"trust": 3.4
},
{
"db": "BID",
"id": "93096",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-08186",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97099",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"id": "VAR-201609-0181",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
}
],
"trust": 1.367450498
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
}
]
},
"last_update_date": "2023-12-18T12:57:36.398000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160921-01-smartphone",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160921-01-smartphone-en"
},
{
"title": "Patches for multiple Huawei smartphone denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/81804"
},
{
"title": "Multiple Huawei Fixes for smartphone video driver denial of service vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64237"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160921-01-smartphone-en"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/93096"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8279"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8279"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160921-01-smartphone-cn"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"date": "2016-09-26T00:00:00",
"db": "VULHUB",
"id": "VHN-97099"
},
{
"date": "2016-09-21T00:00:00",
"db": "BID",
"id": "93096"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"date": "2016-09-26T14:59:09.680000",
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"date": "2016-09-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"date": "2016-12-02T00:00:00",
"db": "VULHUB",
"id": "VHN-97099"
},
{
"date": "2016-09-23T00:00:00",
"db": "BID",
"id": "93096"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"date": "2016-12-02T23:37:26.757000",
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"date": "2016-09-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in video drivers for smartphone software (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.