SB2025030305 - Multiple vulnerabilities in Samsung products



SB2025030305 - Multiple vulnerabilities in Samsung products

Published: March 3, 2025

Security Bulletin ID SB2025030305
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Type Confusion (CVE-ID: CVE-2024-49196)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a type confusion error. A remote attacker can pass specially crafted data to the application, trigger a type confusion error and cause a denial of service comdition on the target system.


2) Out-of-bounds write (CVE-ID: CVE-2024-52924)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error during the decoding of Registration Accept messages. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.


3) Buffer overflow (CVE-ID: CVE-2024-52923)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error during decoding of DL NAS Transport messages. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.


4) Buffer overflow (CVE-ID: CVE-2024-50600)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in STOP_KEEP_ALIVE_OFFLOAD. A remote attacker can trigger memory corruption and gain access to the target system.


5) Buffer overflow (CVE-ID: CVE-2024-49198)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in START_KEEP_ALIVE_OFFLOAD. A remote attacker can trigger memory corruption and gain access to the target system.


Remediation

Install update from vendor's website.