CVE-2023-21243Classic Buffer Overflow in Frameworks Base

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 13

Description

In validateForCommonR1andR2 of PasspointConfiguration.java, there is a possible way to inflate the size of a config file with no limits due to a buffer overflow. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

Androidplatform/frameworks_base11:011:2023-07-01
Androidplatform/packages_modules_wifi13-next:013-next:2023-07-01+3
Androidplatform/frameworks_opt_net_wifi11:011:2023-07-01
CVEListV5google/android4 versions+3
NVDgoogle/android4 versions+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5vx9-r389-x79h: In validateForCommonR1andR2 of PasspointConfiguration2023-07-13
CVEList
CVE-2023-21243: In validateForCommonR1andR2 of PasspointConfiguration2023-07-12
OSV
CVE-2023-21243: In validateForCommonR1andR2 of PasspointConfiguration2023-07-01

📋Vendor Advisories

1
Android
CVE-2023-21243: Android Security Bulletin 2023-07-01 CVE: CVE-2023-21243 Severity: HIGH Type: DoS Affected AOSP versions: 11, 12, 12L, 13 References: A-2744451942023-07-01
CVE-2023-21243 — Classic Buffer Overflow | cvebase