Trinadh465 / frameworks_base_AOSP10_r33_CVE-2023-20963

Other
0 stars 0 forks source link

CVE-2023-20919 (High) detected in baseandroid-10.0.0_r34 #161

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-20919 - High Severity Vulnerability

Vulnerable Library - baseandroid-10.0.0_r34

Android framework classes and services

Library home page: https://android.googlesource.com/platform/frameworks/base

Found in HEAD commit: 877b898e21377e1326e3c7e522898e53b9f5d5d0

Found in base branch: master

Vulnerable Source Files (1)

Vulnerability Details

In getStringsForPrefix of Settings.java, there is a possible prevention of package uninstallation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252663068

Publish Date: 2023-01-26

URL: CVE-2023-20919

CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://android.googlesource.com/platform/frameworks/base/+/c224467912010cce927d206366d772f511c98728

Release Date: 2022-11-04

Fix Resolution: android-13.0.0_r19


Step up your Open Source Security Game with Mend here