ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0431

CVE-2020-0138 (High) detected in https://source.codeaurora.org/external/imx/aosp/platform/system/bt/android-10.0.0_r33

Opened this issue · 0 comments

CVE-2020-0138 - High Severity Vulnerability

Vulnerable Library - https://source.codeaurora.org/external/imx/aosp/platform/system/bt/android-10.0.0_r33

AOSP Platform System bt

Library home page: https://source.codeaurora.org/external/imx/aosp/platform/system/bt/

Found in HEAD commit: 7869a7ed3a07f4f5f85f9d218919d6f8e5f818e5

Found in base branch: master

Vulnerable Source Files (1)

/btif/src/btif_rc.cc

Vulnerability Details

In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416

Publish Date: 2020-06-11

URL: CVE-2020-0138

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://android.googlesource.com/platform/system/bt/+/refs/tags/android-10.0.0_r37

Release Date: 2020-06-11

Fix Resolution: android-10.0.0_r37


Step up your Open Source Security Game with Mend here