SB2022040429 - Multiple vulnerabilities in Qualcomm chipsets



SB2022040429 - Multiple vulnerabilities in Qualcomm chipsets

Published: April 4, 2022 Updated: April 5, 2022

Security Bulletin ID SB2022040429
Severity
High
Patch available
YES
Number of vulnerabilities 27
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 22% Medium 15% Low 63%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 27 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2021-30327)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the EDL Sahara protocol implementation. An attacker with physical access to device can trigger memory corruption and execute arbitrary code on the target system.


2) Buffer overflow (CVE-ID: CVE-2021-35081)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing SSID length received from beacon or probe response during an IBSS session. A remote attacker can send specially crafted traffic to the device, trigger memory corruption and execute arbitrary code on the target system.



3) Out-of-bounds read (CVE-ID: CVE-2021-35071)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition while copying data from DBR buffer to RX buffer in WLAN component. A malicious application can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


4) Improper access control (CVE-ID: CVE-2021-35112)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improper access control in register configuration within the Graphics component. A malicious application can bypass implemented security restrictions and escalate privileges on the system.


5) Improper Authorization (CVE-ID: CVE-2021-30344)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper authorization in the Multi-Mode Call Processor when handling replayed LTE security mode command. A remote attacker can send specially crafted packets to the device and perform a denial of service (DoS) attack.


6) Out-of-bounds read (CVE-ID: CVE-2021-35100)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when parsing Id3 tags in video processor. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


7) Key management errors (CVE-ID: CVE-2021-30339)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper key management when reading PRNG output. A malicious application can escalate privileges on the system.


8) Stack-based buffer overflow (CVE-ID: CVE-2021-30341)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Data Modem when processing DSM packets. A remote unauthenticated attacker can send specially crafted DSM packets to the system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-30342)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition in LTE component between PDCP and RRC tasks when processing RRC Command packets. A remote attacker can send specially crafted packets to the device and execute arbitrary code on the system.


10) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-30343)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition between PDCP and RRC tasks in Modem component  when processing RPC Command packets. A remote attacker can send specially crafted packets to the device and execute arbitrary code on the system.


11) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-30347)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition between PDCP and RRC tasks in Modem component  when processing RPC Command packets. A remote attacker can send specially crafted packets to the device and execute arbitrary code on the system.

12) Buffer overflow (CVE-ID: CVE-2021-35104)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing audio clips in Audio component. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


13) Improper Validation of Array Index (CVE-ID: CVE-2021-35126)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper validation of array index within the DSP Service. A malicious application can trigger a boundary error and execute arbitrary code with elevated privileges.


14) Improper access control (CVE-ID: CVE-2021-30281)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper access restrictions within the Core subsystem. A local application can execute arbitrary code with elevated privileges.


15) Input validation error (CVE-ID: CVE-2021-30338)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in TrustZone memory transfer interface in core subsystem. A malicious application can gain access to sensitive information.


16) Reachable Assertion (CVE-ID: CVE-2021-30340)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion when processing coreset in PDCCH configuration in SA mode in Modem. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.


17) Use-after-free (CVE-ID: CVE-2021-35130)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in layer support in graphics component. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


18) Use-after-free (CVE-ID: CVE-2021-30334)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when checking DRM file status in Display component. A malicious application can trigger a use-after-fee error and execute arbitrary code with elevated privileges.


19) Buffer overflow (CVE-ID: CVE-2021-35123)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary within the Bluetooth HOST component when processing GATT multi notifications. An attacker with physical access to device can send specially crafted packets to the device, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


20) Buffer overflow (CVE-ID: CVE-2021-35129)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the BT Controller. A local application can trigger memory corruption and escalate privileges on the system.


21) Improper access control (CVE-ID: CVE-2021-35070)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in kernel component due to improper SMMU configuration. A local application can gain access to sensitive information.


22) Buffer overflow (CVE-ID: CVE-2021-30350)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the core subsystem when processing MBN header. A local application can trigger buffer overflow and execute arbitrary code with elevated privileges.


23) Improper access control (CVE-ID: CVE-2021-30346)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper SMMU configuration, which results in RPM secure Stream  accessing any secure resource. A local application can gain access to sensitive information.


24) Improper access control (CVE-ID: CVE-2021-30349)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions AC database after memory allocation in core subsystem. A local application can escalate privileges on the system.


25) Improper access control (CVE-ID: CVE-2021-30345)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper SMMU configuration, which results in RPM secure Stream  accessing any secure resource. A local application can gain access to sensitive information.


26) Race condition (CVE-ID: CVE-2021-35095)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition when handling queue client registrations in Linux kernel. A local application can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


27) Type conversion (CVE-ID: CVE-2021-35091)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a type conversion error in Linux Graphics subsystem when handling page fault for global memory. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.