In several functions of MediaCodec.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-245860753
CVE-2023-20933 - High Severity Vulnerability
Vulnerable Library - avandroid-12.0.0_r29
Library home page: https://android.googlesource.com/platform/frameworks/av
Found in HEAD commit: 521bc901938387100c2c8a29e7874d519c892334
Found in base branch: master
Vulnerable Source Files (1)
/media/libstagefright/MediaCodec.cpp
Vulnerability Details
In several functions of MediaCodec.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-245860753
Publish Date: 2023-02-28
URL: CVE-2023-20933
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Step up your Open Source Security Game with Mend here