SB2022120647 - Multiple vulnerabilities in Qualcomm chipsets



SB2022120647 - Multiple vulnerabilities in Qualcomm chipsets

Published: December 6, 2022 Updated: May 4, 2023

Security Bulletin ID SB2022120647
Severity
Medium
Patch available
YES
Number of vulnerabilities 20
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 20 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2022-22063)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Core component caused by improper configuration in boot remapper. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


2) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2022-25682)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the User Identity Module when decoding command from card. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

3) Improper Validation of Array Index (CVE-ID: CVE-2022-25695)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the User Identity Module when processing GSTK Proactive commands. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

4) Error Handling (CVE-ID: CVE-2022-25685)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the Multi-Mode Call Processor. A remote attacker can send specially crafted traffic to the device and perform a denial of service (DoS) attack.


5) Use-after-free (CVE-ID: CVE-2022-25677)

The vulnerability allows a local application to escalate privileges on the system

The vulnerability exists due to a use-after-free error within the DIAG component when processing dci packets. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


6) Improper Validation of Array Index (CVE-ID: CVE-2022-25711)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Camera driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

7) Buffer overflow (CVE-ID: CVE-2022-25712)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Camera driver. A local application can trigger memory corruption and execute arbitrary code on the device.


8) Reachable Assertion (CVE-ID: CVE-2022-25672)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component when processing SIB1 with invalid Bandwidth. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.


9) Reachable Assertion (CVE-ID: CVE-2022-25673)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component when processing configuration from network. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.

10) Buffer overflow (CVE-ID: CVE-2022-25681)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within kernel caused by the hypervisor not correctly invalidating the processor translation caches. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


11) Reachable Assertion (CVE-ID: CVE-2022-25689)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.

12) Reachable Assertion (CVE-ID: CVE-2022-25691)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component when processing SIB1 with invalid SCS and bandwidth settings. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.

13) Reachable Assertion (CVE-ID: CVE-2022-25692)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component when processing common config procedure. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.


14) Buffer overflow (CVE-ID: CVE-2022-25697)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in i2c buses when reading address configuration from i2c driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


15) Buffer overflow (CVE-ID: CVE-2022-25698)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in SPI buses when reading address configuration from spi buses. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

16) Reachable Assertion (CVE-ID: CVE-2022-25702)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component when processing reconfiguration message. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.

17) Out-of-bounds read (CVE-ID: CVE-2022-33235)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the WLAN firmware when parsing security context info attributes. A remote attacker can send specially crafted traffic to the device, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


18) Infinite loop (CVE-ID: CVE-2022-33238)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the WLAN Firmware when processing an incoming FTM frames. A remote attacker can send specially crafted traffic to the device, consume all available system resources and cause denial of service conditions.


19) Reachable Assertion (CVE-ID: CVE-2022-25675)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component when processing filter rule from application client. A remote attacker can send specially crafted data to the device and perform a denial of service (DoS) attack.

20) Out-of-bounds read (CVE-ID: CVE-2022-33268)

The vulnerability allows an attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Bluetooth HOST when pairing and connecting A2DP. An attacker with [physical proximity to device can trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.