Описание
Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 4.2.2+git20130529-5.1 |
| cosmic | not-affected | 4.2.2+git20130529-5.1 |
| devel | not-affected | 4.2.2+git20130529-5.1 |
| disco | not-affected | 4.2.2+git20130529-5.1 |
| esm-apps/bionic | not-affected | 4.2.2+git20130529-5.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| esm-infra/xenial | not-affected | 4.2.2+git20130529-5.1 |
| lucid | DNE | |
| precise | DNE |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
Integer signedness error in system/core/adb/adb_client.c in Android De ...
Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
7.5 High
CVSS2