SB2024120367 - Multiple vulnerabilities in Google Android



SB2024120367 - Multiple vulnerabilities in Google Android

Published: December 3, 2024

Security Bulletin ID SB2024120367
Severity
Medium
Patch available
YES
Number of vulnerabilities 14
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 7% Medium 7% Low 86%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 14 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2024-43077)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


2) Input validation error (CVE-ID: CVE-2024-43701)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


3) Out-of-bounds write (CVE-ID: CVE-2024-20125)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within vdec. A local application can execute arbitrary code.


4) Integer overflow (CVE-ID: CVE-2024-33063)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host Communication. A remote attacker can perform a denial of service (DoS) attack.


5) Improper Validation of Array Index (CVE-ID: CVE-2024-33044)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Hypervisor. A local application can execute arbitrary code.


6) Buffer over-read (CVE-ID: CVE-2024-33056)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in MProc. A local application can execute arbitrary code.


7) Stack-based buffer overflow (CVE-ID: CVE-2024-43048)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Performance. A local application can execute arbitrary code.


8) Input validation error (CVE-ID: CVE-2024-43052)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Video Analytics and Processing. A local application can execute arbitrary code.


9) Improper input validation (CVE-ID: CVE-2024-43097)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


10) Improper input validation (CVE-ID: CVE-2024-43769)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


11) Improper input validation (CVE-ID: CVE-2024-43762)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


12) Improper input validation (CVE-ID: CVE-2024-43767)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


13) Improper input validation (CVE-ID: CVE-2024-43768)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


14) Improper input validation (CVE-ID: CVE-2024-43764)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


Remediation

Install update from vendor's website.