SB2023011085 - Multiple vulnerabilities in Qualcomm chipsets



SB2023011085 - Multiple vulnerabilities in Qualcomm chipsets

Published: January 10, 2023 Updated: January 11, 2023

Security Bulletin ID SB2023011085
Severity
High
Patch available
YES
Number of vulnerabilities 30
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 17% Medium 23% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 30 secuirty vulnerabilities.


1) Buffer over-read (CVE-ID: CVE-2022-33253)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.


2) Integer overflow (CVE-ID: CVE-2022-22088)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can execute arbitrary code.


3) Memory corruption (CVE-ID: CVE-2022-33300)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive Android OS. A local application can execute arbitrary code.


4) NULL Pointer Dereference (CVE-ID: CVE-2022-33299)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can perform a denial of service (DoS) attack.


5) NULL Pointer Dereference (CVE-ID: CVE-2022-33290)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can perform a denial of service (DoS) attack.


6) Buffer over-read (CVE-ID: CVE-2022-33286)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.


7) Buffer over-read (CVE-ID: CVE-2022-33285)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.


8) Buffer over-read (CVE-ID: CVE-2022-33284)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.


9) Buffer over-read (CVE-ID: CVE-2022-33283)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.


10) Buffer overflow (CVE-ID: CVE-2022-33276)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Modem. A local application can execute arbitrary code.


11) Improper Validation of Array Index (CVE-ID: CVE-2022-33274)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Android Core. A local application can execute arbitrary code.


12) Integer overflow (CVE-ID: CVE-2022-33266)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Audio. A local application can read and manipulate data.


13) Buffer over-read (CVE-ID: CVE-2022-33252)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.


14) Buffer over-read (CVE-ID: CVE-2022-33255)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in Bluetooth HOST. A remote attacker can read and manipulate data.


15) Buffer overflow (CVE-ID: CVE-2022-25746)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Kernel. A local privileged application can execute arbitrary code.


16) Use After Free (CVE-ID: CVE-2022-25725)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in MODEM. A local application can perform a denial of service (DoS) attack.


17) Information Exposure (CVE-ID: CVE-2022-33265)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in Powerline Communication Firmware. A remote attacker can read and manipulate data.


18) Integer overflow (CVE-ID: CVE-2022-33219)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive. A local application can execute arbitrary code.


19) Memory corruption (CVE-ID: CVE-2022-33218)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive. A local privileged application can execute arbitrary code.


20) Information Exposure (CVE-ID: CVE-2022-25722)

The vulnerability allows a local privileged application to read and manipulate data.

The vulnerability exists due to improper input validation in DSP Services. A local privileged application can read and manipulate data.


21) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-25716)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Multimedia Framework. A local privileged application can execute arbitrary code.


22) Incorrect Type Conversion or Cast (Type Conversion) (CVE-ID: CVE-2022-25721)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Video driver. A local privileged application can execute arbitrary code.


23) Use After Free (CVE-ID: CVE-2022-25717)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Display. A local privileged application can execute arbitrary code.


24) Incorrect Type Conversion or Cast (Type Conversion) (CVE-ID: CVE-2022-25715)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Display driver. A local privileged application can execute arbitrary code.


25) Buffer over-read (CVE-ID: CVE-2022-22079)

The vulnerability allows a local attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in BOOT. A local attacker can perform a denial of service (DoS) attack.


26) Stack-based buffer overflow (CVE-ID: CVE-2022-40516)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


27) Stack-based buffer overflow (CVE-ID: CVE-2022-40517)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


28) Out-of-bounds read (CVE-ID: CVE-2022-40518)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A local user can trigger out-of-bounds read error and read contents of memory on the system.


29) Out-of-bounds read (CVE-ID: CVE-2022-40519)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A local user can trigger out-of-bounds read error and read contents of memory on the system.


30) Stack-based buffer overflow (CVE-ID: CVE-2022-40520)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.