Page 141 of 702 results (0.013 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Android 1.5 CRBxx allows local users to bypass the (1) Manifest.permission.CAMERA (aka android.permission.CAMERA) and (2) Manifest.permission.AUDIO_RECORD (aka android.permission.RECORD_AUDIO) configuration settings by installing and executing an application that does not make a permission request before using the camera or microphone. Android v1.5 CRBxx permite a a usuarios locales saltarse los valores de la configuración de (1) Manifest.permission.CAMERA (también conocido como android.permission.CAMERA) y (2) Manifest.permission.AUDIO_RECORD (tambien conocido como android.permission.RECORD_AUDIO) instalando y ejecutando una aplicación que no hace una petición de permiso para usar la cámara o el micrófono. • http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=4d8adefd35efdea849611b8b02d61f9517e47760 http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=7b7225c8fdbead25235c74811b30ff4ee690dc58 http://android.git.kernel.org/?p=platform/packages/apps/Camera.git%3Ba=commit%3Bh=e655d54160e5a56d4909f2459eeae9012e9f187f http://www.ocert.org/advisories/ocert-2009-011.html http://www.openwall.com/lists/oss-security/2009/07/16/4 http://www.securityfocus.com/archive/1/505012/100/0&#x • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The PackageManagerService class in services/java/com/android/server/PackageManagerService.java in Android 1.5 through 1.5 CRB42 does not properly check developer certificates during processing of sharedUserId requests at an application's installation time, which allows remote user-assisted attackers to access application data by creating a package that specifies a shared user ID with an arbitrary application. La clase PackageManagerService en services/java/com/android/server/PackageManagerService.java en Android v1.5 a v1.5 CRB42 no comprueba adecuadamente los certificados de desarrollador durante el procesado de las peticiones sharedUserId en el momento de instalar aplicaciones, lo que permite a atacantes remotos acceder a datos de la aplicación mediante la creación de un paquete que especifique un sharedUserId con una aplicación de su elección. • http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=5d6d773fab559fdc12e553d60d789f3991ac552c http://www.ocert.org/advisories/ocert-2009-006.html http://www.openwall.com/lists/oss-security/2009/05/22/14 http://www.securityfocus.com/archive/1/503770 http://www.securityfocus.com/bid/35090 • CWE-287: Improper Authentication •