In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/February-2024 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Feb 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References | () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory | |
First Time |
Mediatek mt9685
Mediatek mt9679 Mediatek mt9675 Mediatek mt9610 Mediatek mt9269 Mediatek mt9021 Mediatek mt9636 Mediatek mt9667 Mediatek mt9222 Mediatek mt5586 Mediatek mt9652 Mediatek mt9256 Mediatek mt9613 Mediatek mt9602 Mediatek mt5696 Mediatek mt9629 Mediatek mt5691 Mediatek mt9255 Mediatek mt9689 Mediatek mt9022 Mediatek mt9650 Mediatek mt5583 Google android Mediatek mt9618 Mediatek mt9653 Mediatek mt9688 Mediatek mt9632 Mediatek mt9631 Mediatek mt9671 Mediatek mt9612 Mediatek mt9666 Mediatek mt9617 Mediatek mt9639 Mediatek mt9025 Mediatek mt9288 Mediatek mt9286 Mediatek mt9020 Mediatek mt9633 Mediatek mt9010 Mediatek Mediatek mt9649 Mediatek mt9266 Mediatek mt9686 Mediatek mt9026 Mediatek mt9603 Mediatek mt9615 Mediatek mt9220 Mediatek mt9218 Mediatek mt9221 Mediatek mt9216 Mediatek mt9011 Mediatek mt9012 Mediatek mt9015 Mediatek mt5695 Mediatek mt9611 Mediatek mt9630 Mediatek mt9660 Mediatek mt9669 Mediatek mt9016 Mediatek mt9638 |
05 Feb 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-05 06:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-20001
Mitre link : CVE-2024-20001
CVE.ORG link : CVE-2024-20001
JSON object : View
Products Affected
mediatek
- mt9288
- mt9633
- mt9660
- mt9221
- mt9618
- mt9689
- mt9631
- mt9669
- mt9675
- mt9638
- mt9688
- mt5583
- mt9016
- mt9613
- mt9025
- mt9255
- mt9020
- mt9269
- mt9602
- mt9218
- mt9653
- mt9671
- mt9220
- mt9026
- mt9630
- mt9667
- mt9603
- mt9652
- mt9666
- mt9216
- mt9022
- mt9010
- mt9011
- mt9012
- mt5691
- mt9650
- mt5695
- mt9222
- mt9679
- mt9615
- mt9639
- mt9612
- mt9685
- mt9266
- mt9632
- mt9256
- mt9636
- mt5696
- mt9629
- mt9021
- mt9686
- mt5586
- mt9611
- mt9610
- mt9015
- mt9286
- mt9649
- mt9617
- android
CWE
CWE-787
Out-of-bounds Write