SB2023060539 - Multiple vulnerabilities in Google Android
Published: June 5, 2023 Updated: June 6, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 56 secuirty vulnerabilities.
1) Information exposure (CVE-ID: CVE-2022-40523)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in Kernel. A local application can gain access to sensitive information.
2) Reachable Assertion (CVE-ID: CVE-2022-33251)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
3) Stack-based buffer overflow (CVE-ID: CVE-2022-33264)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in Modem. A local application can read and manipulate data.
4) Stack-based buffer overflow (CVE-ID: CVE-2022-40516)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Stack-based buffer overflow (CVE-ID: CVE-2022-40517)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Stack-based buffer overflow (CVE-ID: CVE-2022-40520)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Improper Authorization (CVE-ID: CVE-2022-40521)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
8) Untrusted Pointer Dereference (CVE-ID: CVE-2022-40533)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Core. A local application can perform a denial of service (DoS) attack.
9) Improper Access Control (CVE-ID: CVE-2022-40529)
The vulnerability allows a local application to damange or delete data.
The vulnerability exists due to improper input validation in Kernel. A local application can damange or delete data.
10) Improper Authorization (CVE-ID: CVE-2022-40536)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
11) Reachable Assertion (CVE-ID: CVE-2022-40538)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
12) Memory corruption (CVE-ID: CVE-2023-21628)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN HAL. A local application can execute arbitrary code.
13) Buffer over-read (CVE-ID: CVE-2023-21658)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
14) Buffer over-read (CVE-ID: CVE-2023-21659)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
15) Buffer over-read (CVE-ID: CVE-2023-21661)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
16) Reachable Assertion (CVE-ID: CVE-2022-22060)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
17) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-33257)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.
18) Out-of-bounds write (CVE-ID: CVE-2022-22706)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges. This vulnerability was patched in Google Pixel and tracked under #VU64876 (CVE-2021-39793).
Note, the vulnerability is known to be exploited in the wild in targeted attacks.
19) Out-of-bounds write (CVE-ID: CVE-2022-48438)
The vulnerability allows a local application to read, manipulate or delete data.
The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the cp_dump driver in Kernel. A local application can read, manipulate or delete data.
20) Out-of-bounds read (CVE-ID: CVE-2022-46781)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition. A local application can trigger an out-of-bounds read error and read contents of memory on the system.
21) Missing Authorization (CVE-ID: CVE-2022-48390)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to a possible missing permission check within the telephony service in Android. A local application can read and manipulate data.
22) Missing Authorization (CVE-ID: CVE-2022-48392)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to a possible missing permission check within the dialer service in Android. A local application can read and manipulate data.
23) Improper Check or Handling of Exceptional Conditions (CVE-ID: CVE-2022-48391)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to a possible missing permission check within the telephony service in Android. A local application can read and manipulate data.
24) Improper Access Control (CVE-ID: CVE-2023-21670)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in GPU Subsystem. A local application can execute arbitrary code.
25) Use After Free (CVE-ID: CVE-2022-33292)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Qualcomm IPC. A local application can execute arbitrary code.
26) Memory corruption (CVE-ID: CVE-2023-21656)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN HOST. A local application can execute arbitrary code.
27) Improper input validation (CVE-ID: CVE-2023-21657)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.
28) Buffer over-read (CVE-ID: CVE-2023-21669)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in WLAN HOST. A remote attacker can read and manipulate data.
29) Improper input validation (CVE-ID: CVE-2023-21144)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
30) Improper input validation (CVE-ID: CVE-2023-21122)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
31) Improper input validation (CVE-ID: CVE-2023-21121)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
32) Improper input validation (CVE-ID: CVE-2023-21115)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
33) Improper input validation (CVE-ID: CVE-2023-21130)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
34) Improper input validation (CVE-ID: CVE-2023-21108)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
35) Improper input validation (CVE-ID: CVE-2023-21143)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
36) Improper input validation (CVE-ID: CVE-2023-21137)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
37) Improper input validation (CVE-ID: CVE-2023-21136)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
38) Information exposure (CVE-ID: CVE-2023-21105)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
39) Improper input validation (CVE-ID: CVE-2023-21139)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
40) Improper input validation (CVE-ID: CVE-2023-21131)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
41) Improper input validation (CVE-ID: CVE-2023-21129)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
42) Information exposure (CVE-ID: CVE-2023-21095)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
43) Information exposure (CVE-ID: CVE-2023-21142)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
44) Improper input validation (CVE-ID: CVE-2023-21138)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
45) Information exposure (CVE-ID: CVE-2023-21141)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
46) Improper input validation (CVE-ID: CVE-2023-21135)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
47) Improper input validation (CVE-ID: CVE-2023-21124)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
48) Improper input validation (CVE-ID: CVE-2023-21123)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
49) Improper input validation (CVE-ID: CVE-2023-21128)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
50) Improper input validation (CVE-ID: CVE-2023-21126)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
51) Improper input validation (CVE-ID: CVE-2023-21127)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
52) Use-after-free (CVE-ID: CVE-2022-28349)
The vulnerability allows a malicious application to escalate privileges on the device.
The vulnerability exists due to a use-after-free error. A malicious application can trigger a use-after-free error and execute arbitrary code with elevated privileges.
53) Input validation error (CVE-ID: CVE-2021-0945)
The vulnerability allows a local application to escalate privileges on the device.
The vulnerability exists due to an unspecified error within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
54) Input validation error (CVE-ID: CVE-2021-0701)
The vulnerability allows a local application to escalate privileges on the device.
The vulnerability exists due to an unspecified error within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
55) Input validation error (CVE-ID: CVE-2023-21120)
The vulnerability allows a local application to escalate privileges on the device.
The vulnerability exists due to an unspecified error in Hardware DRM component. A local application can execute arbitrary code with elevated privileges.56) Input validation error (CVE-ID: CVE-2023-21101)
The vulnerability allows a local application to escalate privileges on the device.
The vulnerability exists due to an unspecified error in widevine component. A local application can execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.