Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-57x5-vvhv-rvxm

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary file via an attack on the sensor-settings file.

The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary file via an attack on the sensor-settings file.

EPSS

Процентиль: 9%
0.00032
Низкий

Дефекты

CWE-59

Связанные уязвимости

nvd
больше 11 лет назад

The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary file via an attack on the sensor-settings file.

EPSS

Процентиль: 9%
0.00032
Низкий

Дефекты

CWE-59