Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3rrh-jvpr-5pv8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In sound_trigger_event_alloc of platform.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-167663878

In sound_trigger_event_alloc of platform.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-167663878

EPSS

Процентиль: 3%
0.00016
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

In sound_trigger_event_alloc of platform.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-167663878

CVSS3: 7.8
fstec
почти 5 лет назад

Уязвимость реализации функции sound_trigger_event_alloc компонента Audio Server ядра операционных систем Android, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 3%
0.00016
Низкий

Дефекты

CWE-787