SB2023080746 - Multiple vulnerabilities in MediaTek chipsets



SB2023080746 - Multiple vulnerabilities in MediaTek chipsets

Published: August 7, 2023

Security Bulletin ID SB2023080746
Severity
Low
Patch available
YES
Number of vulnerabilities 35
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 35 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2023-20810)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to improper input validation within IOMMU. A local privileged application can gain access to sensitive information.


2) Out-of-bounds write (CVE-ID: CVE-2023-20804)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within imgsys. A local privileged application can execute arbitrary code.


3) Out-of-bounds write (CVE-ID: CVE-2023-20805)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within imgsys. A local privileged application can execute arbitrary code.


4) Write-what-where Condition (CVE-ID: CVE-2023-20806)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within hcp. A local privileged application can execute arbitrary code.


5) Improper input validation (CVE-ID: CVE-2023-20807)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within dpe. A local privileged application can execute arbitrary code.


6) Out-of-bounds write (CVE-ID: CVE-2023-20808)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within OPTEE. A local privileged application can execute arbitrary code.


7) Out-of-bounds write (CVE-ID: CVE-2023-20809)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within vdec. A local privileged application can execute arbitrary code.


8) Out-of-bounds write (CVE-ID: CVE-2023-20811)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within IOMMU. A local privileged application can execute arbitrary code.


9) Memory corruption (CVE-ID: CVE-2023-20802)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within imgsys. A local privileged application can execute arbitrary code.


10) Improper input validation (CVE-ID: CVE-2023-20812)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within wlan driver. A local privileged application can execute arbitrary code.


11) Improper input validation (CVE-ID: CVE-2023-20813)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to improper input validation within wlan service. A local privileged application can gain access to sensitive information.


12) Improper input validation (CVE-ID: CVE-2023-20814)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.


13) Improper input validation (CVE-ID: CVE-2023-20815)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.


14) Improper input validation (CVE-ID: CVE-2023-20816)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.


15) Improper input validation (CVE-ID: CVE-2023-20817)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.


16) Improper input validation (CVE-ID: CVE-2023-20818)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to improper input validation within wlan service. A local privileged application can gain access to sensitive information.


17) Memory corruption (CVE-ID: CVE-2023-20803)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation within imgsys. A local privileged application can execute arbitrary code.


18) Improper input validation (CVE-ID: CVE-2023-20801)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a race condition within imgsys. A local privileged application can execute arbitrary code.


19) Improper input validation (CVE-ID: CVE-2023-20780)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can gain access to sensitive information.


20) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2023-20787)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a race condition within thermal. A local privileged application can execute arbitrary code.


21) Improper input validation (CVE-ID: CVE-2023-20781)

The vulnerability allows a local privileged application to perform service disruption.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can perform service disruption.


22) Improper input validation (CVE-ID: CVE-2023-20782)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can gain access to sensitive information.


23) Improper input validation (CVE-ID: CVE-2023-20783)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.


24) Improper input validation (CVE-ID: CVE-2023-20784)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.


25) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2023-20785)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within audio. A local privileged application can execute arbitrary code.


26) Improper input validation (CVE-ID: CVE-2023-20786)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within gps. A local privileged application can execute arbitrary code.


27) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2023-20788)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a race condition within thermal. A local privileged application can execute arbitrary code.


28) Improper input validation (CVE-ID: CVE-2023-20800)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a mssing ptr check within imgsys. A local privileged application can execute arbitrary code.


29) Improper input validation (CVE-ID: CVE-2023-20789)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to a missing bounds check within jpeg. A local privileged application can gain access to sensitive information.


30) Improper input validation (CVE-ID: CVE-2023-20790)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to a missing bounds check within nvram. A local privileged application can gain access to sensitive information.


31) Improper input validation (CVE-ID: CVE-2023-20793)

The vulnerability allows a local privileged application to perform service disruption.

The vulnerability exists due to a missing bounds check within apu. A local privileged application can perform service disruption.


32) Improper input validation (CVE-ID: CVE-2023-20795)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within ril. A local privileged application can execute arbitrary code.


33) Improper input validation (CVE-ID: CVE-2023-20796)

The vulnerability allows a local privileged application to perform service disruption.

The vulnerability exists due to an incorrect bounds check within power. A local privileged application can perform service disruption.


34) Out-of-bounds write (CVE-ID: CVE-2023-20797)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within camera middleware. A local privileged application can execute arbitrary code.


35) Out-of-bounds read (CVE-ID: CVE-2023-20798)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to an incorrect calculation of buffer size within pda. A local privileged application can gain access to sensitive information.


Remediation

Install update from vendor's website.