Описание
Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.
Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-3874
- https://github.com/revolutionary/zergRush/blob/master/zergRush.c
- http://code.google.com/p/android/issues/detail?id=21681
- http://www.openwall.com/lists/oss-security/2011/11/08/3
- http://www.openwall.com/lists/oss-security/2011/11/08/4
- http://www.openwall.com/lists/oss-security/2011/11/10/1
Связанные уязвимости
Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.