Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-54x8-qj95-fq96

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 17312693.

The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 17312693.

EPSS

Процентиль: 30%
0.00107
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 17312693.

nvd
больше 10 лет назад

The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 17312693.

fstec
больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю получить привилегии различных приложений

EPSS

Процентиль: 30%
0.00107
Низкий