CVE-2024-34727Classic Buffer Overflow in Packages Modules Bluetooth

Severity
7.5HIGHNVD
EPSS
0.4%
top 38.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 15
Latest updateAug 16

Description

In sdpu_compare_uuid_with_attr of sdp_utils.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Androidplatform/packages_modules_bluetooth14-next:014-next:2024-08-01+2
CVEListV5google/android4 versions+3
NVDgoogle/android4 versions+3

🔴Vulnerability Details

3
GHSA
GHSA-h3r8-2pw7-fhc3: In sdpu_compare_uuid_with_attr of sdp_utils2024-08-16
CVEList
CVE-2024-34727: In sdpu_compare_uuid_with_attr of sdp_utils2024-08-15
OSV
CVE-2024-34727: In sdpu_compare_uuid_with_attr of sdp_utils2024-08-01

📋Vendor Advisories

1
Android
CVE-2024-34727: Android Security Bulletin 2024-08-01 CVE: CVE-2024-34727 Severity: HIGH Type: ID Affected AOSP versions: 12, 12L, 13, 14 References: A-2871844352024-08-01
CVE-2024-34727 — Classic Buffer Overflow | cvebase