First published: Tue Sep 05 2023(Updated: )
In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to an integer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-35684 is high.
CVE-2023-35684 affects Google Android versions 11.0, 12.0, 12.1, and 13.0.
No, user interaction is not needed for exploitation of CVE-2023-35684.
To fix CVE-2023-35684, update your Google Android device to the latest version available.
More information about CVE-2023-35684 can be found at the following references: [Reference 1](https://android.googlesource.com/platform/packages/modules/Bluetooth/+/668bbca29797728004d88db4c9b69102f3939008), [Reference 2](https://source.android.com/security/bulletin/2023-09-01), [Reference 3](https://source.android.com/docs/security/bulletin/2023-09-01).