Описание
Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.
Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-0986
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40999
- http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
- http://securityreason.com/securityalert/3727
- http://www.coresecurity.com/?action=item&id=2148
- http://www.securityfocus.com/archive/1/489135/100/0/threaded
- http://www.securityfocus.com/bid/28006
EPSS
CVE ID
Связанные уязвимости
Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.
EPSS