SB2023060539 - Multiple vulnerabilities in Google Android



SB2023060539 - Multiple vulnerabilities in Google Android

Published: June 5, 2023 Updated: June 6, 2023

Security Bulletin ID SB2023060539
Severity
High
Patch available
YES
Number of vulnerabilities 56
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 9% Medium 14% Low 77%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 56 secuirty vulnerabilities.


1) Information exposure (CVE-ID: CVE-2022-40523)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Kernel. A local application can gain access to sensitive information.


2) Reachable Assertion (CVE-ID: CVE-2022-33251)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


3) Stack-based buffer overflow (CVE-ID: CVE-2022-33264)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Modem. A local application can read and manipulate data.


4) Stack-based buffer overflow (CVE-ID: CVE-2022-40516)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Stack-based buffer overflow (CVE-ID: CVE-2022-40517)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Stack-based buffer overflow (CVE-ID: CVE-2022-40520)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Improper Authorization (CVE-ID: CVE-2022-40521)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


8) Untrusted Pointer Dereference (CVE-ID: CVE-2022-40533)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Core. A local application can perform a denial of service (DoS) attack.


9) Improper Access Control (CVE-ID: CVE-2022-40529)

The vulnerability allows a local application to damange or delete data.

The vulnerability exists due to improper input validation in Kernel. A local application can damange or delete data.


10) Improper Authorization (CVE-ID: CVE-2022-40536)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


11) Reachable Assertion (CVE-ID: CVE-2022-40538)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


12) Memory corruption (CVE-ID: CVE-2023-21628)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN HAL. A local application can execute arbitrary code.


13) Buffer over-read (CVE-ID: CVE-2023-21658)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


14) Buffer over-read (CVE-ID: CVE-2023-21659)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


15) Buffer over-read (CVE-ID: CVE-2023-21661)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


16) Reachable Assertion (CVE-ID: CVE-2022-22060)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


17) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-33257)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


18) Out-of-bounds write (CVE-ID: CVE-2022-22706)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges. This vulnerability was patched in Google Pixel and tracked under #VU64876 (CVE-2021-39793).

Note, the vulnerability is known to be exploited in the wild in targeted attacks.


19) Out-of-bounds write (CVE-ID: CVE-2022-48438)

The vulnerability allows a local application to read, manipulate or delete data.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the cp_dump driver in Kernel. A local application can read, manipulate or delete data.


20) Out-of-bounds read (CVE-ID: CVE-2022-46781)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A local application can trigger an out-of-bounds read error and read contents of memory on the system.


21) Missing Authorization (CVE-ID: CVE-2022-48390)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to a possible missing permission check within the telephony service in Android. A local application can read and manipulate data.


22) Missing Authorization (CVE-ID: CVE-2022-48392)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to a possible missing permission check within the dialer service in Android. A local application can read and manipulate data.


23) Improper Check or Handling of Exceptional Conditions (CVE-ID: CVE-2022-48391)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to a possible missing permission check within the telephony service in Android. A local application can read and manipulate data.


24) Improper Access Control (CVE-ID: CVE-2023-21670)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in GPU Subsystem. A local application can execute arbitrary code.


25) Use After Free (CVE-ID: CVE-2022-33292)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Qualcomm IPC. A local application can execute arbitrary code.


26) Memory corruption (CVE-ID: CVE-2023-21656)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN HOST. A local application can execute arbitrary code.


27) Improper input validation (CVE-ID: CVE-2023-21657)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.


28) Buffer over-read (CVE-ID: CVE-2023-21669)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in WLAN HOST. A remote attacker can read and manipulate data.


29) Improper input validation (CVE-ID: CVE-2023-21144)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


30) Improper input validation (CVE-ID: CVE-2023-21122)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


31) Improper input validation (CVE-ID: CVE-2023-21121)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


32) Improper input validation (CVE-ID: CVE-2023-21115)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


33) Improper input validation (CVE-ID: CVE-2023-21130)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


34) Improper input validation (CVE-ID: CVE-2023-21108)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


35) Improper input validation (CVE-ID: CVE-2023-21143)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


36) Improper input validation (CVE-ID: CVE-2023-21137)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


37) Improper input validation (CVE-ID: CVE-2023-21136)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


38) Information exposure (CVE-ID: CVE-2023-21105)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


39) Improper input validation (CVE-ID: CVE-2023-21139)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


40) Improper input validation (CVE-ID: CVE-2023-21131)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


41) Improper input validation (CVE-ID: CVE-2023-21129)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


42) Information exposure (CVE-ID: CVE-2023-21095)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


43) Information exposure (CVE-ID: CVE-2023-21142)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


44) Improper input validation (CVE-ID: CVE-2023-21138)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


45) Information exposure (CVE-ID: CVE-2023-21141)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


46) Improper input validation (CVE-ID: CVE-2023-21135)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


47) Improper input validation (CVE-ID: CVE-2023-21124)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


48) Improper input validation (CVE-ID: CVE-2023-21123)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


49) Improper input validation (CVE-ID: CVE-2023-21128)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


50) Improper input validation (CVE-ID: CVE-2023-21126)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


51) Improper input validation (CVE-ID: CVE-2023-21127)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


52) Use-after-free (CVE-ID: CVE-2022-28349)

The vulnerability allows a malicious application to escalate privileges on the device.

The vulnerability exists due to a use-after-free error. A malicious application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


53) Input validation error (CVE-ID: CVE-2021-0945)

The vulnerability allows a local application to escalate privileges on the device.

The vulnerability exists due to an unspecified error within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


54) Input validation error (CVE-ID: CVE-2021-0701)

The vulnerability allows a local application to escalate privileges on the device.

The vulnerability exists due to an unspecified error within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


55) Input validation error (CVE-ID: CVE-2023-21120)

The vulnerability allows a local application to escalate privileges on the device.

The vulnerability exists due to an unspecified error in Hardware DRM component. A local application can execute arbitrary code with elevated privileges.

56) Input validation error (CVE-ID: CVE-2023-21101)

The vulnerability allows a local application to escalate privileges on the device.

The vulnerability exists due to an unspecified error in widevine component. A local application can execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.