First published: Mon Dec 04 2023(Updated: )
In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45781 is high.
The affected software for CVE-2023-45781 is Google Android.
The vulnerability description of CVE-2023-45781 is that there is a possible out of bounds read in the parse_gap_data function of utils.cc in Google Android, which could lead to local information disclosure.
To fix CVE-2023-45781, users should apply the security patch provided by Google for the affected Android version.
No, user interaction is not needed for exploitation of CVE-2023-45781.