Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4r6p-r9pm-m3ff

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

EPSS

Процентиль: 13%
0.00043
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

CVSS3: 7.8
nvd
больше 9 лет назад

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

fstec
больше 9 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 13%
0.00043
Низкий

7.8 High

CVSS3