SB2023011085 - Multiple vulnerabilities in Qualcomm chipsets
Published: January 10, 2023 Updated: January 11, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 30 secuirty vulnerabilities.
1) Buffer over-read (CVE-ID: CVE-2022-33253)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.
2) Integer overflow (CVE-ID: CVE-2022-22088)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can execute arbitrary code.
3) Memory corruption (CVE-ID: CVE-2022-33300)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Automotive Android OS. A local application can execute arbitrary code.
4) NULL Pointer Dereference (CVE-ID: CVE-2022-33299)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can perform a denial of service (DoS) attack.
5) NULL Pointer Dereference (CVE-ID: CVE-2022-33290)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can perform a denial of service (DoS) attack.
6) Buffer over-read (CVE-ID: CVE-2022-33286)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.
7) Buffer over-read (CVE-ID: CVE-2022-33285)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.
8) Buffer over-read (CVE-ID: CVE-2022-33284)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.
9) Buffer over-read (CVE-ID: CVE-2022-33283)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.
10) Buffer overflow (CVE-ID: CVE-2022-33276)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Modem. A local application can execute arbitrary code.
11) Improper Validation of Array Index (CVE-ID: CVE-2022-33274)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Android Core. A local application can execute arbitrary code.
12) Integer overflow (CVE-ID: CVE-2022-33266)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in Audio. A local application can read and manipulate data.
13) Buffer over-read (CVE-ID: CVE-2022-33252)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.
14) Buffer over-read (CVE-ID: CVE-2022-33255)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can read and manipulate data.
15) Buffer overflow (CVE-ID: CVE-2022-25746)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in Kernel. A local privileged application can execute arbitrary code.
16) Use After Free (CVE-ID: CVE-2022-25725)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in MODEM. A local application can perform a denial of service (DoS) attack.
17) Information Exposure (CVE-ID: CVE-2022-33265)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in Powerline Communication Firmware. A remote attacker can read and manipulate data.
18) Integer overflow (CVE-ID: CVE-2022-33219)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Automotive. A local application can execute arbitrary code.
19) Memory corruption (CVE-ID: CVE-2022-33218)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in Automotive. A local privileged application can execute arbitrary code.
20) Information Exposure (CVE-ID: CVE-2022-25722)
The vulnerability allows a local privileged application to read and manipulate data.
The vulnerability exists due to improper input validation in DSP Services. A local privileged application can read and manipulate data.
21) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-25716)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in Multimedia Framework. A local privileged application can execute arbitrary code.
22) Incorrect Type Conversion or Cast (Type Conversion) (CVE-ID: CVE-2022-25721)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in Video driver. A local privileged application can execute arbitrary code.
23) Use After Free (CVE-ID: CVE-2022-25717)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in Display. A local privileged application can execute arbitrary code.
24) Incorrect Type Conversion or Cast (Type Conversion) (CVE-ID: CVE-2022-25715)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in Display driver. A local privileged application can execute arbitrary code.
25) Buffer over-read (CVE-ID: CVE-2022-22079)
The vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in BOOT. A local attacker can perform a denial of service (DoS) attack.
26) Stack-based buffer overflow (CVE-ID: CVE-2022-40516)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
27) Stack-based buffer overflow (CVE-ID: CVE-2022-40517)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
28) Out-of-bounds read (CVE-ID: CVE-2022-40518)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition. A local user can trigger out-of-bounds read error and read contents of memory on the system.
29) Out-of-bounds read (CVE-ID: CVE-2022-40519)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition. A local user can trigger out-of-bounds read error and read contents of memory on the system.
30) Stack-based buffer overflow (CVE-ID: CVE-2022-40520)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.