In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mediatek
Mediatek mt6580 Mediatek mt6739 Mediatek mt6761 Mediatek mt6765 Mediatek mt6768 Mediatek mt6779 Mediatek mt6781 Mediatek mt6785 Mediatek mt6789 Mediatek mt6833 Mediatek mt6835 Mediatek mt6853 Mediatek mt6855 Mediatek mt6873 Mediatek mt6877 Mediatek mt6878 Mediatek mt6879 Mediatek mt6883 Mediatek mt6885 Mediatek mt6886 Mediatek mt6889 Mediatek mt6893 Mediatek mt6895 Mediatek mt6896 Mediatek mt6897 Mediatek mt6983 Mediatek mt6985 Mediatek mt6989 Mediatek mt8321 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8678 Mediatek mt8765 Mediatek mt8766 Mediatek mt8766r Mediatek mt8768 Mediatek mt8771 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8788e Mediatek mt8791t Mediatek mt8797 Mediatek mt8798 Mediatek mt8863t |
|
CPEs | cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766r:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8863t:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Mediatek
Mediatek mt6580 Mediatek mt6739 Mediatek mt6761 Mediatek mt6765 Mediatek mt6768 Mediatek mt6779 Mediatek mt6781 Mediatek mt6785 Mediatek mt6789 Mediatek mt6833 Mediatek mt6835 Mediatek mt6853 Mediatek mt6855 Mediatek mt6873 Mediatek mt6877 Mediatek mt6878 Mediatek mt6879 Mediatek mt6883 Mediatek mt6885 Mediatek mt6886 Mediatek mt6889 Mediatek mt6893 Mediatek mt6895 Mediatek mt6896 Mediatek mt6897 Mediatek mt6983 Mediatek mt6985 Mediatek mt6989 Mediatek mt8321 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8678 Mediatek mt8765 Mediatek mt8766 Mediatek mt8766r Mediatek mt8768 Mediatek mt8771 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8788e Mediatek mt8791t Mediatek mt8797 Mediatek mt8798 Mediatek mt8863t |
|
Metrics |
cvssV3_1
|
Mon, 02 Dec 2024 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024. | |
Weaknesses | CWE-125 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: MediaTek
Published: 2024-12-02T03:06:56.942Z
Updated: 2024-12-02T17:00:56.869Z
Reserved: 2023-11-02T13:35:35.180Z
Link: CVE-2024-20128
Vulnrichment
Updated: 2024-12-02T15:46:03.448Z
NVD
Status : Awaiting Analysis
Published: 2024-12-02T04:15:04.967
Modified: 2024-12-02T17:15:10.230
Link: CVE-2024-20128
Redhat
No data.