CVE编号
CVE-2019-5282利用情况
暂无补丁情况
N/A披露时间
2019-11-14漏洞描述
Bastet module of some Huawei smartphones with Versions earlier than Emily-AL00A 9.0.0.182(C00E82R1P21), Versions earlier than Emily-TL00B 9.0.0.182(C01E82R1P21), Versions earlier than Emily-L09C 9.0.0.203(C432E7R1P11), Versions earlier than Emily-L29C 9.0.0.203(C432E7R1P11), Versions earlier than Emily-L29C 9.0.0.202(C185E2R1P12) have a double free vulnerability. An attacker tricks the user into installing a malicious application, which frees on the same memory address twice. Successful exploit could result in malicious code execution.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190220-01-smar... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | huawei | emily-al00a_firmware | * |
Up to (excluding) emily-al00a_9.0.0.182\(c00e82r1p21\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | emily-l09c_firmware | * |
Up to (excluding) emily-l09c_9.0.0.203\(c432e7r1p11\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | emily-l29c_firmware | * |
Up to (excluding) emily-l29c_9.0.0.202\(c185e2r1p12\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | emily-l29c_firmware | * |
Up to (excluding) emily-l29c_9.0.0.203\(c432e7r1p11\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | emily-l29c_firmware | * |
Up to (excluding) emily-l29c_9.0.0.205\(c635e2r1p11\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | emily-l29c_firmware | * |
Up to (excluding) emily-l29c_9.0.0.207\(c636e7r1p13\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | emily-tl00b_firmware | * |
Up to (excluding) emily-tl00b_9.0.0.182\(c01e82r1p21\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | hima-l09ca_firmware | * |
Up to (excluding) hima-l09ca_9.0.0.198\(c432e10r1p16\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | hima-l29ca_firmware | * |
Up to (excluding) hima-l29ca_9.0.0.198\(c432e10r1p16\) |
|||||
运行在以下环境 | |||||||||
系统 | huawei | hima-l29c_firmware | * |
Up to (excluding) hima-l29c_9.0.0.204\(c636e10r2p1\) |
|||||
运行在以下环境 | |||||||||
硬件 | huawei | emily-al00a | - | - | |||||
运行在以下环境 | |||||||||
硬件 | huawei | emily-l09c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | huawei | emily-l29c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | huawei | emily-tl00b | - | - | |||||
运行在以下环境 | |||||||||
硬件 | huawei | hima-l09ca | - | - | |||||
运行在以下环境 | |||||||||
硬件 | huawei | hima-l29c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | huawei | hima-l29ca | - | - | |||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...