Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qrv4-5384-prhq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In WAVSource::read of WAVExtractor.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-170583712.

In WAVSource::read of WAVExtractor.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-170583712.

EPSS

Процентиль: 42%
0.00198
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 6.5
nvd
около 5 лет назад

In WAVSource::read of WAVExtractor.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-170583712.

EPSS

Процентиль: 42%
0.00198
Низкий

Дефекты

CWE-787