Vulnerabilites related to mediatek - mt9629
cve-2022-20107
Vulnerability from cvelistv5
Published
2022-05-03 20:05
Modified
2024-08-03 02:02
Severity ?
Summary
In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.677Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T20:05:51",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20107",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20107",
      datePublished: "2022-05-03T20:05:51",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.677Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20105
Vulnerability from cvelistv5
Published
2022-05-03 20:04
Modified
2024-08-03 02:02
Severity ?
Summary
In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.637Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T20:04:48",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20105",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20105",
      datePublished: "2022-05-03T20:04:48",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.637Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20002
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
Severity ?
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.242Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5583, MT5586, MT5691, MT5695, MT5696, MT9010, MT9011, MT9012, MT9015, MT9016, MT9020, MT9021, MT9022, MT9025, MT9026, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9603, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9633, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9660, MT9666, MT9667, MT9669, MT9671, MT9675, MT9679, MT9685, MT9686, MT9688, MT9689",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0, 14.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:42.613Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20002",
      datePublished: "2024-02-05T05:59:42.613Z",
      dateReserved: "2023-11-02T13:35:35.146Z",
      dateUpdated: "2024-08-01T21:52:31.242Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0620
Vulnerability from cvelistv5
Published
2021-11-18 14:54
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.225Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:54:52",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0620",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0620",
      datePublished: "2021-11-18T14:54:52",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.225Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0621
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.224Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8184, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:03",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0621",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8184, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0621",
      datePublished: "2021-11-18T14:55:03",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.224Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20811
Vulnerability from cvelistv5
Published
2023-08-07 03:22
Modified
2024-12-04 15:11
Severity ?
Summary
In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.212Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20811",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-04T15:11:33.415387Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T15:11:49.404Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5221, MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9666, MT9667, MT9669, MT9671, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0 / Linux 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:22:00.788Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20811",
      datePublished: "2023-08-07T03:22:00.788Z",
      dateReserved: "2022-10-28T02:03:23.672Z",
      dateUpdated: "2024-12-04T15:11:49.404Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20108
Vulnerability from cvelistv5
Published
2022-05-03 20:06
Modified
2024-08-03 02:02
Severity ?
Summary
In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:31.002Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T20:06:13",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20108",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20108",
      datePublished: "2022-05-03T20:06:13",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:31.002Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20810
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-17 14:27
Severity ?
Summary
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:41.000Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20810",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-17T14:27:16.034002Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-17T14:27:33.720Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5221, MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9666, MT9667, MT9669, MT9671, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0 / Linux 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:58.826Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20810",
      datePublished: "2023-08-07T03:21:58.826Z",
      dateReserved: "2022-10-28T02:03:23.672Z",
      dateUpdated: "2024-10-17T14:27:33.720Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0623
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.200Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8186, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:44",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0623",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8186, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0623",
      datePublished: "2021-11-18T14:55:44",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.200Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-20106
Vulnerability from cvelistv5
Published
2022-05-03 20:05
Modified
2024-08-03 02:02
Severity ?
Summary
In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T02:02:30.506Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-03T20:05:17",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@mediatek.com",
               ID: "CVE-2022-20106",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT9011, MT9215, MT9216, MT9220, MT9221, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 9.0, 10.0, 11.0 or Linux Kernel 4.9, 4.19",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "MediaTek, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2022-20106",
      datePublished: "2022-05-03T20:05:17",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-08-03T02:02:30.506Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0622
Vulnerability from cvelistv5
Published
2021-11-18 14:55
Modified
2024-08-03 15:47
Severity ?
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:47:28.181Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-18T14:55:30",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2021-0622",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android 10.0, 11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                     refsource: "MISC",
                     url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2021-0622",
      datePublished: "2021-11-18T14:55:30",
      dateReserved: "2020-11-06T00:00:00",
      dateUpdated: "2024-08-03T15:47:28.181Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20809
Vulnerability from cvelistv5
Published
2023-08-07 03:21
Modified
2024-10-22 19:12
Summary
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:14:40.976Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5583",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5691",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5695",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9010",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9011",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9012",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9016",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9020",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9021",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9022",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9030",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9031",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9032",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9215",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9216",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9218",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9220",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9221",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9222",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9255",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9256",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9266",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9269",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9285",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9286",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9288",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9600",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9602",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9610",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9611",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9612",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9613",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9615",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9617",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9629",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9630",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9631",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9632",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9636",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9638",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9639",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9650",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9652",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9666",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9667",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9669",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9670",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9671",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9675",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9685",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9686",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9688",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "android",
                  vendor: "google",
                  versions: [
                     {
                        status: "affected",
                        version: "10.0",
                     },
                     {
                        status: "affected",
                        version: "11.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20809",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T19:11:57.487601Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T19:12:32.096Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5583, MT5691, MT5695, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9030, MT9031, MT9032, MT9215, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9288, MT9600, MT9602, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9666, MT9667, MT9669, MT9670, MT9671, MT9675, MT9685, MT9686, MT9688",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-07T03:21:56.862Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-20809",
      datePublished: "2023-08-07T03:21:56.862Z",
      dateReserved: "2022-10-28T02:03:23.672Z",
      dateUpdated: "2024-10-22T19:12:32.096Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32830
Vulnerability from cvelistv5
Published
2023-10-02 02:05
Modified
2024-09-21 15:18
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:25:37.057Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5527",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5583",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5598",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5599",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5670",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5680",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5691",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5695",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5806",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5813",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5815",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5816",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5833",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5835",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt5895",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9010",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9011",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9012",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9016",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9020",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9021",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9022",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9215",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9216",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9221",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9222",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9255",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9256",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9266",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9269",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9285",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9286",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9600",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9602",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9610",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9612",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9613",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9615",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9617",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9629",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9630",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9631",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9632",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9633",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9636",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9638",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9639",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9649",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9650",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9652",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9653",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9660",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9666",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9667",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9669",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9670",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9671",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9675",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9679",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9685",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9686",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9688",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9900",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9901",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9931",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9950",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9969",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9970",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9980",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mt9981",
                  vendor: "mediatek",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "android",
                  vendor: "google",
                  versions: [
                     {
                        status: "affected",
                        version: "10.0",
                     },
                     {
                        status: "affected",
                        version: "11.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 6.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-32830",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-21T15:15:41.446321Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-787",
                        description: "CWE-787 Out-of-bounds Write",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-21T15:18:25.800Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5527, MT5583, MT5598, MT5599, MT5670, MT5680, MT5691, MT5695, MT5806, MT5813, MT5815, MT5816, MT5833, MT5835, MT5895, MT9010, MT9011, MT9012, MT9016, MT9020, MT9021, MT9022, MT9215, MT9216, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9285, MT9286, MT9600, MT9602, MT9610, MT9612, MT9613, MT9615, MT9617, MT9629, MT9630, MT9631, MT9632, MT9633, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9660, MT9666, MT9667, MT9669, MT9670, MT9671, MT9675, MT9679, MT9685, MT9686, MT9688, MT9900, MT9901, MT9931, MT9950, MT9969, MT9970, MT9980, MT9981",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 10.0, 11.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-02T02:05:44.060Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2023-32830",
      datePublished: "2023-10-02T02:05:44.060Z",
      dateReserved: "2023-05-16T03:04:32.150Z",
      dateUpdated: "2024-09-21T15:18:25.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20001
Vulnerability from cvelistv5
Published
2024-02-05 05:59
Modified
2024-08-01 21:52
Severity ?
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:52:31.394Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "MT5583, MT5586, MT5691, MT5695, MT5696, MT9010, MT9011, MT9012, MT9015, MT9016, MT9020, MT9021, MT9022, MT9025, MT9026, MT9216, MT9218, MT9220, MT9221, MT9222, MT9255, MT9256, MT9266, MT9269, MT9286, MT9288, MT9602, MT9603, MT9610, MT9611, MT9612, MT9613, MT9615, MT9617, MT9618, MT9629, MT9630, MT9631, MT9632, MT9633, MT9636, MT9638, MT9639, MT9649, MT9650, MT9652, MT9653, MT9660, MT9666, MT9667, MT9669, MT9671, MT9675, MT9679, MT9685, MT9686, MT9688, MT9689",
               vendor: "MediaTek, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "Android 11.0, 12.0, 13.0, 14.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T05:59:41.091Z",
            orgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
            shortName: "MediaTek",
         },
         references: [
            {
               url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
      assignerShortName: "MediaTek",
      cveId: "CVE-2024-20001",
      datePublished: "2024-02-05T05:59:41.091Z",
      dateReserved: "2023-11-02T13:35:35.146Z",
      dateUpdated: "2024-08-01T21:52:31.394Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8184:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF76BE8-E35C-470B-813D-5290F6B0D281",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento de enteros. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05561383.",
      },
   ],
   id: "CVE-2021-0621",
   lastModified: "2024-11-21T05:43:02.060",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.163",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "518D4593-D5E2-489C-92C3-343716A621E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70D16AAC-938F-4BE8-B7BB-067249A6C197",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB388AFB-1185-4CF1-8023-C26E366F89DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
      },
   ],
   id: "CVE-2023-20810",
   lastModified: "2024-11-21T07:41:34.623",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:14.307",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento del búfer de la pila. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05561388.",
      },
   ],
   id: "CVE-2021-0622",
   lastModified: "2024-11-21T05:43:02.173",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.230",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "518D4593-D5E2-489C-92C3-343716A621E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70D16AAC-938F-4BE8-B7BB-067249A6C197",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB388AFB-1185-4CF1-8023-C26E366F89DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In IOMMU, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.",
      },
   ],
   id: "CVE-2023-20811",
   lastModified: "2024-11-21T07:41:34.753",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-07T04:15:14.367",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B10B33-5F64-4039-8351-694A7AB6E4E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.",
      },
      {
         lang: "es",
         value: "En el servicio de subtítulos, se presenta un posible bloqueo de la aplicación debido a un desbordamiento de enteros. Esto podría conllevar a una denegación de servicio local con privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del parche: DTV03330673; ID de Incidencia: DTV03330673",
      },
   ],
   id: "CVE-2022-20107",
   lastModified: "2024-11-21T06:42:10.187",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 4.9,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T21:15:09.213",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-02 03:15
Modified
2024-11-21 08:04
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C59206E9-31C7-40A4-86EF-1D12EA2C5CDC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07AEB6AF-2644-4560-9C11-C608C1AD9F66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2587EAA-29E0-4123-9855-CA726B8014C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F87A1085-222A-4135-9DB5-EB1AB0452561",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4D227C-8387-441E-B085-E933FFB69AE8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B68EA99F-5323-4167-9DF9-D677BCA37A22",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9237902-24AE-4127-AC96-5982BD37ECC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63B93DFF-3D39-42DD-B6EB-3E3172F25A93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B2216B-3B20-4DFC-BB2A-7DDD060E5C40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF26725-1701-40F4-83E9-1A4709B60763",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB80E351-B6E5-4571-A603-04A3A6AFB8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4A720E3-FF7F-4607-998D-EBD23F38A2DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F433EC9-C9F5-40D4-9EBB-219295EC1978",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B14AF01-D1D9-483B-9D10-2697A08FFA8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.",
      },
      {
         lang: "es",
         value: "En TVAPI, existe una posible escritura fuera de límites debido a una verificación de límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03802522; ID del problema: DTV03802522.",
      },
   ],
   id: "CVE-2023-32830",
   lastModified: "2024-11-21T08:04:08.193",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-02T03:15:10.233",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/October-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento del búfer de la pila. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05561381.",
      },
   ],
   id: "CVE-2021-0620",
   lastModified: "2024-11-21T05:43:01.937",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.100",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-18 15:15
Modified
2024-11-21 05:43
Summary
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C38B265-3EE8-417C-9D59-6182939ED27E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C04171-DB18-40D7-AFC5-04A869942396",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC084C16-6693-4FEA-9BDD-B633EAA3E432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455B256C-83C8-406F-B28F-A4205E7C094E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4FF926A-2D26-4666-ACA4-474A89243566",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46F71838-4E50-4F2A-9EB8-30AE5DF8511E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82E144B-0BAD-47E1-A657-3A5880988FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E76B29F-007E-4445-B3F3-3FDC054FEB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA8A390-9F52-4CF3-9B45-936CE3E2B828",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A1CB8F-3C1C-4374-8D46-23175D1174DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7362AED0-47F2-4D48-A292-89F717F0697E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7038AEA0-5BBE-44C9-92DE-96BDE3EEE45B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C27948-65A7-4B1E-9F10-6744D176A5C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D808EF4D-0A54-4324-8341-240F7AFABC40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EDB89E-8140-4202-97B3-9D7337E90FDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2C5CC4F-DA66-4980-A4BB-693987431A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F726F486-A86F-4215-AD93-7A07A071844A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C445EB80-6021-4E26-B74E-1B4B6910CE48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F19C76A-50DF-4ACA-BACA-07157B4D838B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43E779F6-F0A0-4153-9A1D-B715C3A2F80E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06CD97E1-8A76-48B4-9780-9698EF5A960F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4D2AED-C713-407F-A34A-52C3D8F65835",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA369B8-8E23-492B-82CC-23114E6A5D1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82E0A4F-072F-474C-B94C-8114ABE05639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9814939B-F05E-4870-90C0-7C0F6BAAEB39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366F1912-756B-443E-9962-224937DD7DFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "328DA6BE-1303-4646-89B7-2EC8DC444532",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD64413C-C774-4C4F-9551-89E1AA9469EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B787DC3-8E5A-4968-B20B-37B6257FAAE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "213B5C7F-D965-4312-9CDF-4F06FA77D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2ED140-C41B-418B-9DC7-8C486304E769",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B5FE245-6346-4078-A3D0-E5F79BB636B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "639C5BDE-2E83-427A-BAB7-85EA9348AC68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2FC35-716A-4706-97BA-5DB165041580",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4452EFCF-5733-40A0-8726-F8E33E569411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "582F1041-CD84-4763-AD6F-E08DD11F689F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4932D34-06F4-49D7-81FB-772A82E8A5B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED210E64-6CE7-42B1-849E-68C0E22521F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "793B7F88-79E7-4031-8AD0-35C9BFD073C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "299378ED-41CE-4966-99B1-65D2BA1215EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF35D-27E0-49AF-A667-13585C8B8071",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE45F606-2E75-48BC-9D1B-99D504974CBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE10C121-F2AD-43D2-8FF9-A6C197858220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1505AD53-987E-4328-8E1D-F5F1EC12B677",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD2C3EC-B62D-4616-964F-FDBE5B14A449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B469BF4-5961-42E9-814B-1BE06D182E45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDB4C96A-A50F-4194-BE9C-BF2DFD3DEB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31E0E580-A76F-4CFA-BFF2-0F7540C63C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "961C13C3-2C3D-46B1-A618-D45920EC5E95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B4C37E-B6CA-4176-B98D-E1C9E66472EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62282860-5EAF-45EA-B36E-6B6F124C3096",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.",
      },
      {
         lang: "es",
         value: "En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento de enteros. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. ID del Parche: ALPS05489178; ID del Problema: ALPS05585817.",
      },
   ],
   id: "CVE-2021-0623",
   lastModified: "2024-11-21T05:43:02.290",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-18T15:15:08.280",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/November-2021",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E684A498-10F3-4BD8-9935-9ED5933F9157",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49437377-6D2F-40FD-8CCF-29179C19D296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26696662-6232-458A-A1E1-067CBDB62FA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF26725-1701-40F4-83E9-1A4709B60763",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB80E351-B6E5-4571-A603-04A3A6AFB8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.",
      },
      {
         lang: "es",
         value: "En TVAPI, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03961601; ID del problema: DTV03961601.",
      },
   ],
   id: "CVE-2024-20001",
   lastModified: "2024-11-21T08:51:45.983",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.027",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 06:15
Modified
2024-11-21 08:51
Summary
In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8FB8EE9-FC56-4D5E-AE55-A5967634740C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FFD0C-9B38-4CAA-B057-1086D794D469",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2700BCC5-634D-4EC6-AB67-5B678D5F951D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E684A498-10F3-4BD8-9935-9ED5933F9157",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "354492FD-4052-41F8-805E-55F387AF8F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6133E43-E032-4334-88C7-116B27B3090D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49437377-6D2F-40FD-8CCF-29179C19D296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26696662-6232-458A-A1E1-067CBDB62FA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CF26725-1701-40F4-83E9-1A4709B60763",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C6E88C-46DD-45AB-88C1-B69FC0E25056",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63BC3AE7-4180-4B8C-AB69-8AC4F502700D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB80E351-B6E5-4571-A603-04A3A6AFB8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717AE700-78CC-4750-92CB-C9293571EC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.",
      },
      {
         lang: "es",
         value: "En TVAPI, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03961715; ID del problema: DTV03961715.",
      },
   ],
   id: "CVE-2024-20002",
   lastModified: "2024-11-21T08:51:46.143",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T06:15:47.083",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/February-2024",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B10B33-5F64-4039-8351-694A7AB6E4E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",
      },
      {
         lang: "es",
         value: "En MM service, se presenta una posible escritura fuera de límites debido a un desbordamiento del búfer en la región heap de la memoria. Esto podría conllevar a una escalada de privilegios local con privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del parche: DTV03330460; ID de Incidencia: DTV03330460",
      },
   ],
   id: "CVE-2022-20106",
   lastModified: "2024-11-21T06:42:10.043",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T21:15:09.167",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B10B33-5F64-4039-8351-694A7AB6E4E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",
      },
      {
         lang: "es",
         value: "En MM service, se presenta una posible escritura fuera de límites debido a un desbordamiento del búfer en la región stack de la memoria. Esto podría conllevar a una escalada de privilegios local con privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del parche: DTV03330460; ID de Incidencia: DTV03330460",
      },
   ],
   id: "CVE-2022-20105",
   lastModified: "2024-11-21T06:42:09.917",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T21:15:09.120",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-03 21:15
Modified
2024-11-21 06:42
Summary
In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B10B33-5F64-4039-8351-694A7AB6E4E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "513F8951-3099-444A-9755-C3A75720EFD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.",
      },
      {
         lang: "es",
         value: "En el servicio de voz, se presenta una posible escritura fuera de límites debido a un desbordamiento del búfer en la región stack de la memoria. Esto podría conllevar a una escalada de privilegios local con privilegios de ejecución System necesarios. No es requerida una interacción del usuario para su explotación. ID del parche: DTV03330702; ID de Incidencia: DTV03330702",
      },
   ],
   id: "CVE-2022-20108",
   lastModified: "2024-11-21T06:42:10.317",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-03T21:15:09.257",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/May-2022",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-07 04:15
Modified
2024-11-21 07:41
Summary
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D558D965-FA70-4822-A770-419E73BA9ED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C394724-3294-4953-85C8-EE3894B5092C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96BD96BE-10BC-4C7E-8A48-C7CB08A61765",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A56009-090B-4101-B000-224412058654",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFB4E04-7BC0-4B48-ABD7-6971E4725895",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAAF66C-9C81-498B-A0C0-3295CB7324A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "350ED16A-35A5-4F54-A01F-6EADE58E5530",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70D16AAC-938F-4BE8-B7BB-067249A6C197",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9031:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D16B86F-32D2-4CA3-B18D-B19F63F14D5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9032:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB388AFB-1185-4CF1-8023-C26E366F89DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "726E51E6-E765-4973-A0D2-5CC746CACFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B45803F-1AD2-47C8-BB9B-276628A0D605",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B028E80F-396F-4898-841D-9E99DE54FAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB0DB25-6CFF-4688-B423-6CC0252C3B59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B250A0A-BE50-45B6-AD72-8EA876F64DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9C5A33A-7B04-4E14-A268-A717CD2420DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAC84405-17EE-4C25-8477-317F2A6A095F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85C42802-293E-448B-A059-DFDEF1D97EC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F19E7E64-721E-436B-B879-D1EDE5EFF84C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A7E7D3C-436A-4068-99F1-AFEB34989F69",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEEB709-8C7B-48AF-B359-9CE9C68790D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6081A92B-4361-462A-9F7F-570AC7256CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1567AAB0-8C08-4A7C-A5D3-4F057C7F6871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ED757E-42DD-4176-B216-915EFD8E2F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA3286D-A136-4EB2-A181-6EF8A556EFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9F24C9-2A69-44D9-A16B-E4187230F984",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E92602E3-1B1B-4683-801D-D151919C63EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF44498-001B-4A51-AB32-EBC206B14741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E6E130-9F65-482B-AF8B-97DA81FCE19E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E5EE7B-1208-4007-AF87-6DC309FFE312",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE404F4-FFAE-4646-9234-15230F0577F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA834B63-F689-48BA-84E6-500351990BFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF1B3B37-22C4-42F4-8264-07512619D706",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B89606-5FD7-4513-984A-16217D37BF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F4FC23-534B-449A-8344-1F13AE9C8C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "392C9A58-EAB1-44B5-B189-98C68CC23199",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D0EF507-52A0-45D1-AC26-97F765E691FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C826242C-440E-4D85-841E-570E9C69777C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD7AC916-FF8D-430D-837C-0587056198AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3E19E5-4DD7-4ECB-A7AE-F501A152078E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5F738-459C-4316-80AF-1B9C33E0F36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B7E06-8C40-4D37-8D10-4816E51CA143",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFD9AD54-9F0F-414B-8936-3A981657D6AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B429106-36BE-42F2-8D05-FB9EF00BDFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7D78E76-6A3B-4736-B7E7-C9032CDA845B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03751198; Issue ID: DTV03751198.",
      },
   ],
   id: "CVE-2023-20809",
   lastModified: "2024-11-21T07:41:34.370",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-08-07T04:15:14.240",
   references: [
      {
         source: "security@mediatek.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://corp.mediatek.com/product-security-bulletin/August-2023",
      },
   ],
   sourceIdentifier: "security@mediatek.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}