CVE-2023-20662

In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560765; Issue ID: ALPS07560765.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*

History

13 Apr 2023, 16:47

Type Values Removed Values Added
CWE CWE-190
CPE cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
References (MISC) https://corp.mediatek.com/product-security-bulletin/April-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/April-2023 - Vendor Advisory
First Time Mediatek mt8786
Mediatek mt8167s
Mediatek mt8798
Mediatek mt8362a
Mediatek mt5221
Mediatek mt8532
Mediatek mt6983
Mediatek mt8771
Mediatek mt8766
Mediatek mt8789
Mediatek mt6895
Mediatek mt8518
Mediatek mt8696
Mediatek mt7902
Mediatek mt8797
Mediatek mt8795t
Google
Yoctoproject
Yoctoproject yocto
Mediatek
Mediatek mt8175
Mediatek mt8788
Mediatek mt7921
Mediatek mt8365
Mediatek mt8168
Mediatek mt6879
Mediatek mt8791t
Google android
Linux linux Kernel
Linux
Mediatek mt8781
Mediatek mt8768
Mediatek mt8385

06 Apr 2023, 19:50

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-06 18:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-20662

Mitre link : CVE-2023-20662

CVE.ORG link : CVE-2023-20662


JSON object : View

Products Affected

mediatek

  • mt8789
  • mt8795t
  • mt7921
  • mt8385
  • mt8797
  • mt8786
  • mt8791t
  • mt8532
  • mt8518
  • mt8696
  • mt8362a
  • mt8768
  • mt8771
  • mt8167s
  • mt6983
  • mt6895
  • mt8788
  • mt5221
  • mt8365
  • mt8766
  • mt6879
  • mt8798
  • mt8168
  • mt8781
  • mt7902
  • mt8175

linux

  • linux_kernel

google

  • android

yoctoproject

  • yocto
CWE
CWE-190

Integer Overflow or Wraparound