BDU:2023-03756

Vulnerability from fstec - Published: 14.06.2022
VLAI Severity ?
Title
Уязвимость драйвера GPS HLOS операционных систем Android встраиваемых плат Qualcomm, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость драйвера GPS HLOS операционных систем Android встраиваемых плат Qualcomm связана с повторным освобождением памяти при вызове отмены регистрации провайдера после вызова регистрации. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Vendor
Qualcomm Technologies Inc.
Software Name
WCD9380, WSA8830, WSA8835, AQT1000, SD835, SD855, Snapdragon 429 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 4100+ Platform, Snapdragon X55 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, QCA6564AU, QCA6574A, QCA6574AU, FastConnect 6900, WCD9370, WCN3950, WSA8810, WSA8815, QAM8255P, QAM8295P, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCS410, QCS610, SA6155P, SA8155P, SA8195P, SA8255P, SA8295P, WCD9340, WCD9341, WCN3980, WCN3988, FastConnect 6200, FastConnect 6800, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, SA6145P, SA6150P, SA8145P, SA8150P, SD865 5G, SDM429W, SW5100, SW5100P, SXR2130, WCD9335, WCN3610, WCN3620, WCN3660B, WCN3680B, WCN3990, CSRB31024, QCA6310, QCA6320, QCA6564
Software Version
- (WCD9380), - (WSA8830), - (WSA8835), - (AQT1000), - (SD835), - (SD855), - (Snapdragon 429 Mobile Platform), - (Snapdragon 835 Mobile PC Platform), - (Snapdragon 855 Mobile Platform), - (Snapdragon 855+/860 Mobile Platform (SM8150-AC)), - (Snapdragon 865 5G Mobile Platform), - (Snapdragon 865+ 5G Mobile Platform (SM8250-AB)), - (Snapdragon 870 5G Mobile Platform (SM8250-AC)), - (Snapdragon W5+ Gen 1 Wearable Platform), - (Snapdragon Wear 4100+ Platform), - (Snapdragon X55 5G Modem-RF System), - (Snapdragon XR2 5G Platform), - (Snapdragon Auto 4G Modem), - (QCA6564AU), - (QCA6574A), - (QCA6574AU), - (FastConnect 6900), - (WCD9370), - (WCN3950), - (WSA8810), - (WSA8815), - (QAM8255P), - (QAM8295P), - (QCA6595AU), - (QCA6696), - (QCA6698AQ), - (QCA6797AQ), - (QCS410), - (QCS610), - (SA6155P), - (SA8155P), - (SA8195P), - (SA8255P), - (SA8295P), - (WCD9340), - (WCD9341), - (WCN3980), - (WCN3988), - (FastConnect 6200), - (FastConnect 6800), - (QCA6391), - (QCA6420), - (QCA6426), - (QCA6430), - (QCA6436), - (SA6145P), - (SA6150P), - (SA8145P), - (SA8150P), - (SD865 5G), - (SDM429W), - (SW5100), - (SW5100P), - (SXR2130), - (WCD9335), - (WCN3610), - (WCN3620), - (WCN3660B), - (WCN3680B), - (WCN3990), - (CSRB31024), - (QCA6310), - (QCA6320), - (QCA6564)
Possible Mitigations
Использование рекомендаций: Для Qualcomm: https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin
Reference
https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin https://vuldb.com/ru/?id.230771 https://source.android.com/docs/security/bulletin/pixel/2023-06-01 https://www.tenable.com/cve/CVE-2022-33227
CWE
CWE-119, CWE-415

{
  "CVSS 2.0": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
  "CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Qualcomm Technologies Inc.",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (WCD9380), - (WSA8830), - (WSA8835), - (AQT1000), - (SD835), - (SD855), - (Snapdragon 429 Mobile Platform), - (Snapdragon 835 Mobile PC Platform), - (Snapdragon 855 Mobile Platform), - (Snapdragon 855+/860 Mobile Platform (SM8150-AC)), - (Snapdragon 865 5G Mobile Platform), - (Snapdragon 865+ 5G Mobile Platform (SM8250-AB)), - (Snapdragon 870 5G Mobile Platform (SM8250-AC)), - (Snapdragon W5+ Gen 1 Wearable Platform), - (Snapdragon Wear 4100+ Platform), - (Snapdragon X55 5G Modem-RF System), - (Snapdragon XR2 5G Platform), - (Snapdragon Auto 4G Modem), - (QCA6564AU), - (QCA6574A), - (QCA6574AU), - (FastConnect 6900), - (WCD9370), - (WCN3950), - (WSA8810), - (WSA8815), - (QAM8255P), - (QAM8295P), - (QCA6595AU), - (QCA6696), - (QCA6698AQ), - (QCA6797AQ), - (QCS410), - (QCS610), - (SA6155P), - (SA8155P), - (SA8195P), - (SA8255P), - (SA8295P), - (WCD9340), - (WCD9341), - (WCN3980), - (WCN3988), - (FastConnect 6200), - (FastConnect 6800), - (QCA6391), - (QCA6420), - (QCA6426), - (QCA6430), - (QCA6436), - (SA6145P), - (SA6150P), - (SA8145P), - (SA8150P), - (SD865 5G), - (SDM429W), - (SW5100), - (SW5100P), - (SXR2130), - (WCD9335), - (WCN3610), - (WCN3620), - (WCN3660B), - (WCN3680B), - (WCN3990), - (CSRB31024), - (QCA6310), - (QCA6320), - (QCA6564)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Qualcomm: \nhttps://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.06.2022",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.07.2023",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.07.2023",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-03756",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-33227",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "WCD9380, WSA8830, WSA8835, AQT1000, SD835, SD855, Snapdragon 429 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 4100+ Platform, Snapdragon X55 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, QCA6564AU, QCA6574A, QCA6574AU, FastConnect 6900, WCD9370, WCN3950, WSA8810, WSA8815, QAM8255P, QAM8295P, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCS410, QCS610, SA6155P, SA8155P, SA8195P, SA8255P, SA8295P, WCD9340, WCD9341, WCN3980, WCN3988, FastConnect 6200, FastConnect 6800, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, SA6145P, SA6150P, SA8145P, SA8150P, SD865 5G, SDM429W, SW5100, SW5100P, SXR2130, WCD9335, WCN3610, WCN3620, WCN3660B, WCN3680B, WCN3990, CSRB31024, QCA6310, QCA6320, QCA6564",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Google Inc Android \u0434\u043e 13 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 GPS HLOS \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Android \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u043b\u0430\u0442 Qualcomm, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119), \u041f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 (CWE-415)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 GPS HLOS \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Android \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u043b\u0430\u0442 Qualcomm \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 \u043e\u0442\u043c\u0435\u043d\u044b \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430 \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u0437\u043e\u0432\u0430 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin\nhttps://vuldb.com/ru/?id.230771\nhttps://source.android.com/docs/security/bulletin/pixel/2023-06-01\nhttps://www.tenable.com/cve/CVE-2022-33227",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119, CWE-415",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,7)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…