In eatt_l2cap_reconfig_completed of eatt_impl.h, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Configurations
History
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://android.googlesource.com/platform/packages/modules/Bluetooth/+/d8d95291f16a8f18f8ffbd6322c14686897c5730 - Vendor Advisory | |
References | () https://source.android.com/security/bulletin/2023-09-01 - Vendor Advisory |
13 Sep 2023, 14:39
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://android.googlesource.com/platform/packages/modules/Bluetooth/+/d8d95291f16a8f18f8ffbd6322c14686897c5730 - Vendor Advisory | |
References | (MISC) https://source.android.com/security/bulletin/2023-09-01 - Vendor Advisory | |
CPE | cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 CWE-190 |
|
First Time |
Google android
|
11 Sep 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-11 21:15
Updated : 2024-11-21 08:08
NVD link : CVE-2023-35681
Mitre link : CVE-2023-35681
CVE.ORG link : CVE-2023-35681
JSON object : View
Products Affected
- android