Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xfh-c7qq-jpr6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In UpdateLoadElement of ic.cc, there is a possible out-of-bounds write due to type confusion. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-117607414

In UpdateLoadElement of ic.cc, there is a possible out-of-bounds write due to type confusion. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-117607414

EPSS

Процентиль: 75%
0.00873
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

In UpdateLoadElement of ic.cc, there is a possible out-of-bounds write due to type confusion. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-117607414

EPSS

Процентиль: 75%
0.00873
Низкий

Дефекты

CWE-787