2023-12-05 00:55:22 +00:00
{
"id" : "CVE-2023-40091" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2023-12-04T23:15:24.387" ,
2024-02-02 05:00:28 +00:00
"lastModified" : "2024-02-02T03:15:39.110" ,
"vulnStatus" : "Analyzed" ,
2023-12-05 00:55:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In onTransact of IncidentService.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
2023-12-05 15:01:07 +00:00
} ,
{
"lang" : "es" ,
"value" : "En onTransact de IncidentService.cpp, existe una posible escritura fuera de los l\u00edmites debido a da\u00f1os en la memoria. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
2023-12-05 00:55:22 +00:00
}
] ,
2023-12-08 17:00:22 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "879FFD0C-9B38-4CAA-B057-1086D794D469"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
}
]
}
] ,
2023-12-05 00:55:22 +00:00
"references" : [
2023-12-22 03:00:36 +00:00
{
"url" : "https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6" ,
2024-02-02 05:00:28 +00:00
"source" : "security@android.com" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2023-12-22 03:00:36 +00:00
} ,
2023-12-05 00:55:22 +00:00
{
"url" : "https://source.android.com/security/bulletin/2023-12-01" ,
2023-12-08 17:00:22 +00:00
"source" : "security@android.com" ,
"tags" : [
2024-02-02 05:00:28 +00:00
"Patch" ,
2023-12-08 17:00:22 +00:00
"Vendor Advisory"
]
2023-12-05 00:55:22 +00:00
}
]
}