Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2g8x-m9jv-c9cq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In loop of DnsTlsSocket.cpp, there is a possible heap memory corruption due to a use after free. This could lead to remote code execution in the netd server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-122856181.

In loop of DnsTlsSocket.cpp, there is a possible heap memory corruption due to a use after free. This could lead to remote code execution in the netd server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-122856181.

EPSS

Процентиль: 73%
0.00758
Низкий

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

In loop of DnsTlsSocket.cpp, there is a possible heap memory corruption due to a use after free. This could lead to remote code execution in the netd server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-122856181.

EPSS

Процентиль: 73%
0.00758
Низкий

Дефекты

CWE-416