SB2022110727 - Multiple vulnerabilities in MediaTek chipsets 



SB2022110727 - Multiple vulnerabilities in MediaTek chipsets

Published: November 7, 2022

Security Bulletin ID SB2022110727
Severity
Medium
Patch available
YES
Number of vulnerabilities 18
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 6% Low 94%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 18 secuirty vulnerabilities.


1) Deserialization of Untrusted Data (CVE-ID: CVE-2022-32601)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insecure input validation when processing serialized data within the telephony service. A local application can pass specially crafted data to the service and execute arbitrary code with elevated privileges.


2) Out-of-bounds read (CVE-ID: CVE-2022-32602)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in keyinstall. A local application can trigger an out-of-bounds read error and read contents of memory on the system.


3) Reachable Assertion (CVE-ID: CVE-2022-26446)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the 4G RRC Modem. A remote attacker can send specially crafted SIB12 (CMAS messages) data to the affected system and perform a denial of service (DoS) attack.


4) Buffer overflow (CVE-ID: CVE-2022-21778)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in vpu. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.



5) Out-of-bounds write (CVE-ID: CVE-2022-32603)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in gpu drm. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


6) Out-of-bounds write (CVE-ID: CVE-2022-32605)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in isp. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


7) Use-after-free (CVE-ID: CVE-2022-32607)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in aee. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


8) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-32608)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition within the jpeg component. A local application can exploit the race and escalate privileges on the system.


9) Use-after-free (CVE-ID: CVE-2022-32609)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in vcu. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


10) Use-after-free (CVE-ID: CVE-2022-32610)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in vcu. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


11) Out-of-bounds write (CVE-ID: CVE-2022-32611)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in isp. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


12) Use-after-free (CVE-ID: CVE-2022-32612)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in vcu. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


13) Use-after-free (CVE-ID: CVE-2022-32613)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in vcu. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


14) Double Free (CVE-ID: CVE-2022-32614)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a logic error within the audio component. A local application can trigger a double free error and execute arbitrary code with elevated privileges.



15) Out-of-bounds write (CVE-ID: CVE-2022-32615)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in ccd. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


16) Out-of-bounds write (CVE-ID: CVE-2022-32616)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in isp. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


17) Out-of-bounds write (CVE-ID: CVE-2022-32617)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in typec. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


18) Out-of-bounds write (CVE-ID: CVE-2022-32618)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in typec. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.