{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-40078","assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","state":"PUBLISHED","assignerShortName":"google_android","dateReserved":"2023-08-09T02:29:29.266Z","datePublished":"2023-12-04T22:40:51.150Z","dateUpdated":"2024-08-02T18:24:54.909Z"},"containers":{"cna":{"providerMetadata":{"orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android","dateUpdated":"2023-12-22T00:16:46.130Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"Elevation of privilege"}]}],"affected":[{"vendor":"Google","product":"Android","versions":[{"version":"14","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"In a2dp_vendor_opus_decoder_decode_packet of a2dp_vendor_opus_decoder.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."}],"references":[{"url":"https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6cdf985a664476659b84d8c74698cb3dfa28f82b"},{"url":"https://source.android.com/security/bulletin/2023-12-01"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T18:24:54.909Z"},"title":"CVE Program Container","references":[{"url":"https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6cdf985a664476659b84d8c74698cb3dfa28f82b","tags":["x_transferred"]},{"url":"https://source.android.com/security/bulletin/2023-12-01","tags":["x_transferred"]}]}]}}