Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pq68-mg4h-3gxg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416

In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416

EPSS

Процентиль: 90%
0.0552
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
больше 5 лет назад

In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416

EPSS

Процентиль: 90%
0.0552
Низкий