2024-06-13 22:03:10 +00:00
{
"id" : "CVE-2024-32913" ,
"sourceIdentifier" : "dsap-vuln-management@google.com" ,
"published" : "2024-06-13T21:15:55.327" ,
2024-08-19 16:03:14 +00:00
"lastModified" : "2024-08-19T14:35:08.433" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-06-13 22:03:10 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In wl_notify_rx_mgmt_frame of wl_cfg80211.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
2024-06-16 02:03:09 +00:00
} ,
{
"lang" : "es" ,
"value" : "En wl_notify_rx_mgmt_frame de wl_cfg80211.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
2024-06-13 22:03:10 +00:00
}
] ,
2024-07-16 16:03:13 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2024-08-19 16:03:14 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2024-07-16 16:03:13 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-190"
} ,
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
2024-08-19 16:03:14 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-190"
}
]
2024-07-16 16:03:13 +00:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
] ,
2024-06-13 22:03:10 +00:00
"references" : [
{
"url" : "https://source.android.com/security/bulletin/pixel/2024-06-01" ,
2024-07-16 16:03:13 +00:00
"source" : "dsap-vuln-management@google.com" ,
"tags" : [
"Vendor Advisory"
]
2024-06-13 22:03:10 +00:00
}
]
}