Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f6hg-g687-vqrf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In btm_proc_smp_cback of tm_ble.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120612744.

In btm_proc_smp_cback of tm_ble.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120612744.

EPSS

Процентиль: 68%
0.00564
Низкий

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 8.8
nvd
почти 7 лет назад

In btm_proc_smp_cback of tm_ble.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120612744.

EPSS

Процентиль: 68%
0.00564
Низкий

Дефекты

CWE-416