Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3762

Опубликовано: 11 июл. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3
CVSS3: 7.8

Описание

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

РелизСтатусПримечание
devel

not-affected

SELinux policy not used
esm-apps/xenial

not-affected

SELinux policy not used
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [SELinux policy not used]]
precise

DNE

trusty

not-affected

SELinux policy not used
trusty/esm

DNE

trusty was not-affected [SELinux policy not used]
upstream

not-affected

SELinux policy not used
vivid/stable-phone-overlay

not-affected

SELinux policy not used
vivid/ubuntu-core

DNE

wily

not-affected

SELinux policy not used

Показывать по

EPSS

Процентиль: 13%
0.00043
Низкий

9.3 Critical

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 9 лет назад

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

CVSS3: 7.8
github
больше 3 лет назад

The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.

fstec
больше 9 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 13%
0.00043
Низкий

9.3 Critical

CVSS2

7.8 High

CVSS3