Описание
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Ссылки
- PatchProduct
- Vendor Advisory
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00287
Низкий
8.8 High
CVSS3
Дефекты
CWE-416
Связанные уязвимости
CVSS3: 8.8
github
5 месяцев назад
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS3: 8.8
fstec
5 месяцев назад
Уязвимость среды выполнения ART (Android Runtime) операционной системы Android, позволяющая нарушителю повысить свои привилегии
EPSS
Процентиль: 52%
0.00287
Низкий
8.8 High
CVSS3
Дефекты
CWE-416