Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xf3-x9jm-fgfc

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In device_class_to_int of device_class.cc, there is a possible out of bounds read due to improper casting. This could lead to local information disclosure in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-140152619

In device_class_to_int of device_class.cc, there is a possible out of bounds read due to improper casting. This could lead to local information disclosure in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-140152619

EPSS

Процентиль: 14%
0.00044
Низкий

Связанные уязвимости

CVSS3: 5.5
nvd
около 6 лет назад

In device_class_to_int of device_class.cc, there is a possible out of bounds read due to improper casting. This could lead to local information disclosure in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-140152619

EPSS

Процентиль: 14%
0.00044
Низкий