SB2023090551 - Multiple vulnerabilities in Google Android
Published: September 5, 2023 Updated: April 5, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 32 secuirty vulnerabilities.
1) Improper Authorization (CVE-ID: CVE-2023-28584)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.
2) Improper Authorization (CVE-ID: CVE-2023-33019)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.
3) Use After Free (CVE-ID: CVE-2023-33021)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.
4) Memory corruption (CVE-ID: CVE-2023-28581)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can execute arbitrary code.
5) Improper Validation of Array Index (CVE-ID: CVE-2022-40534)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.
6) Reachable Assertion (CVE-ID: CVE-2023-21646)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
7) Reachable Assertion (CVE-ID: CVE-2023-21653)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
8) Stack-based buffer overflow (CVE-ID: CVE-2023-28538)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WIN Product. A local application can execute arbitrary code.
9) Memory corruption (CVE-ID: CVE-2023-28549)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN HAL. A local application can execute arbitrary code.
10) Improper Validation of Array Index (CVE-ID: CVE-2023-28573)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN HAL. A local application can execute arbitrary code.
11) Buffer over-read (CVE-ID: CVE-2023-33015)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
12) Buffer over-read (CVE-ID: CVE-2023-33016)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
13) Information exposure (CVE-ID: CVE-2023-35683)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within MediaProvider. A local application can gain access to sensitive information.
14) Improper input validation (CVE-ID: CVE-2023-35670)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in MediaProvider. A local application can execute arbitrary code.
15) Improper input validation (CVE-ID: CVE-2023-35666)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
16) Improper input validation (CVE-ID: CVE-2023-35677)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
17) Improper input validation (CVE-ID: CVE-2023-35681)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth. An attacker with physical proximity to device can trick the victim to open a specially crafted file and execute arbitrary code.
18) Improper input validation (CVE-ID: CVE-2023-35673)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth. An attacker with physical proximity to device can trick the victim to open a specially crafted file and execute arbitrary code.
19) Improper input validation (CVE-ID: CVE-2023-35658)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth. An attacker with physical proximity to device can trick the victim to open a specially crafted file and execute arbitrary code.
20) Information exposure (CVE-ID: CVE-2023-35679)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
21) Information exposure (CVE-ID: CVE-2023-35675)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
22) Improper input validation (CVE-ID: CVE-2023-35687)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
23) Improper input validation (CVE-ID: CVE-2023-35676)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
24) Improper input validation (CVE-ID: CVE-2023-35674)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
Note, the vulnerability is being actively exploited in the wild.
25) Improper input validation (CVE-ID: CVE-2023-35684)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
26) Improper input validation (CVE-ID: CVE-2023-35669)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
27) Information exposure (CVE-ID: CVE-2023-35671)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
28) Information exposure (CVE-ID: CVE-2023-35680)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
29) Improper input validation (CVE-ID: CVE-2023-35667)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
30) Improper input validation (CVE-ID: CVE-2023-35665)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
31) Information exposure (CVE-ID: CVE-2023-35664)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
32) Improper input validation (CVE-ID: CVE-2023-35682)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://source.android.com/docs/security/bulletin/2023-09-01
- https://android.googlesource.com/platform/packages/providers/MediaProvider/+/23d156ed1bed6d2c2b325f0be540d0afca510c49
- https://android.googlesource.com/platform/packages/providers/MediaProvider/+/db3c69afcb0a45c8aa2f333fcde36217889899fe
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/b7ea57f620436c83a9766f928437ddadaa232e3a
- https://android.googlesource.com/platform/packages/apps/Settings/+/846180c19f68f6fb1b0653356401d3235fef846e
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/d8d95291f16a8f18f8ffbd6322c14686897c5730
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8770c07c102c7fdc74626dc717acc8f6dd1c92cc
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/d03a3020de69143b1fe8129d75e55f14951dd192
- https://android.googlesource.com/platform/frameworks/av/+/ea6131efa76a0b2a12724ffd157909e2c6fb4036
- https://android.googlesource.com/platform/frameworks/base/+/c1cf4b9746c9641190730172522324ccd5b8c914
- https://android.googlesource.com/platform/frameworks/base/+/109e58b62dc9fedcee93983678ef9d4931e72afa
- https://android.googlesource.com/platform/frameworks/base/+/7428962d3b064ce1122809d87af65099d1129c9e
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/668bbca29797728004d88db4c9b69102f3939008
- https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6
- https://android.googlesource.com/platform/packages/apps/Nfc/+/745632835f3d97513a9c2a96e56e1dc06c4e4176
- https://android.googlesource.com/platform/packages/services/Telephony/+/674039e70e1c5bf29b808899ac80c709acc82290
- https://android.googlesource.com/platform/packages/apps/Settings/+/d8355ac47e068ad20c6a7b1602e72f0585ec0085
- https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/47299fd978258e67a8eebc361cb7a4dd2936205e
- https://android.googlesource.com/platform/packages/apps/Launcher3/+/09f8b0e52e45a0b39bab457534ba2e5ae91ffad0