This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
There is an input validation vulnerability in Video0 driver of some Huawei smart phones. An attacker may trick a user into installing a malicious application and application can exploit the vulnerability to print stack memory content or crash the system when the application accesses invalid address. (Vulnerability ID: HWPSIRT-2015-12004)
This vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID: CVE-2015-8682.
Huawei has released software updates to fix this vulnerability. This advisory is available at the following link:
Product Name |
Affected Version |
Resolved Product and Version |
P8[1] |
GRA-UL00C00B230 and earlier versions |
GRA-UL00C00B350 |
GRA-UL10C00B230 and earlier versions |
GRA-UL10C00B350 |
|
GRA-TL00C01B230 and earlier versions |
GRA-TL00C01B350 |
|
GRA-CL00C92B230 and earlier versions |
GRA-CL00C92B350 |
|
GRA-CL10C92B230 and earlier versions |
GRA-CL10C92B350 |
|
Mate S[1] |
CRR-TL00C01B153SP01 and earlier versions |
CRR-TL00C01B160SP01 |
CRR-UL00C00B153 and earlier versions |
CRR-UL00C00B160 |
|
CRR-CL00C92B153 and earlier versions |
CRR-CL00C92B161 |
[1] Mobile phones will receive a system update prompt. The vulnerability will be fixed after users install the update.
The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/).
Base Score: 4.7 (AV:L/AC:H/Au:N/C:P/I:N/A:C)
Temporal Score: 3.9 (E:F/RL:O/RC:C)1. Prerequisite:
The attacker successfully tricks a user into installing a malicious application on the smart phone.
2. Attacking procedure:
There is a stack information leak vulnerability in Video0 driver of some Huawei smart phones. It is not enough for an interface of this driver to checking incoming parameter, for which the application can use this interface to read any memory address. An attacker may trick a user into installing a malicious application and application can exploit the vulnerability to print stack memory content or crash the system when the application accesses invalid address.
None
To enjoy Huawei PSIRT services and obtain Huawei product vulnerability information, please visit http://www.huawei.com/en/psirt.
To report a security vulnerability in Huawei products and solutions, please send it to PSIRT@huawei.com. For details, please visit http://www.huawei.com/en/psirt/report-vulnerabilities.