CVE-2010-1807 – Google Android 2.0 < 2.1 - Code Execution (Reverse Shell 10.0.2.2:2222/TCP)
https://notcve.org/view.php?id=CVE-2010-1807
WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2; Android before 2.2; and webkitgtk before 1.2.6; does not properly validate floating-point data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to non-standard NaN representation. WebKit en Apple Safari v4.x anteriores a v4.1.2 y v5.x anteriores a v5.0.2 no valida de forma adecuada los datos con punto flotante, lo que permite a atacantes remotos ejecutar código o provocar una denegación de servicio (caída de la aplicación) a través de un documento HTML manipulado. • https://www.exploit-db.com/exploits/15423 https://www.exploit-db.com/exploits/15548 http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html http://lists.apple.com/archives/security-announce/2010//Sep/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/41856 http://secunia.com/advisories/42314 http://secunia.com/advisories/43068 http://secunia.com/advisories/43086 http://support.apple.com/kb • CWE-20: Improper Input Validation •
CVE-2009-3698
https://notcve.org/view.php?id=CVE-2009-3698
An unspecified function in the Dalvik API in Android 1.5 and earlier allows remote attackers to cause a denial of service (system process restart) via a crafted application, possibly a related issue to CVE-2009-2656. Una función sin especificar en la API de Dalvik en Android v1.5 y anteriores permite a atacantes remotos producir una denegación de servicio (reinicio de sistema) a través de una aplicación manipulada posiblemente un tema relacionado con CVE-2009-2656. • http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=cf4550c3198d6b3d92cdc52707fe70d7cc0caa9f http://securitytracker.com/id?1022986 http://www.ocert.org/advisories/ocert-2009-014.html http://www.securityfocus.com/archive/1/506948/100/0/threaded http://www.securityfocus.com/bid/36590 https://exchange.xforce.ibmcloud.com/vulnerabilities/53654 •
CVE-2009-2999
https://notcve.org/view.php?id=CVE-2009-2999
The com.android.phone process in Android 1.5 CRBxx allows remote attackers to cause a denial of service (application restart and network disconnection) via an SMS message containing a malformed WAP Push message that triggers an ArrayIndexOutOfBoundsException exception, possibly a related issue to CVE-2009-2656. El proceso com.android.phone en Android v1.5 CRBxx permite a atacantes remotos producir una denegación de servicio (reinicio de aplicacion y desconexión de red) a través de un mensaje SMS que contenga un mensaje de Push WAP malformado que inicia una excepción ArrayIndexOutOfBoundsException, posiblemente relacionado con CVE-2009-2656. • http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=46e23fe762d2143d60589ab6d39c4b47c2c754d1 http://securitytracker.com/id?1022986 http://www.ocert.org/advisories/ocert-2009-014.html http://www.securityfocus.com/archive/1/506948/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/53655 •
CVE-2009-2656
https://notcve.org/view.php?id=CVE-2009-2656
Unspecified vulnerability in the com.android.phone process in Android 1.0, 1.1, and 1.5 allows remote attackers to cause a denial of service (network disconnection) via a crafted SMS message, as demonstrated by Collin Mulliner and Charlie Miller at Black Hat USA 2009. Vulnerabilidad sin especificar en el proceso com.android.phone en Android v1.0, v1.1 y v1.5, permite a atacantes remotos provocar una denegación de servicio (desconexión de la red) a través de un mensaje SMS manipulado, como se demostró por Collini Mulliner y Charlie Miller en la BlackHat USA 2009. • http://osvdb.org/56750 http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf http://www.securityfocus.com/bid/35886 •
CVE-2009-2348
https://notcve.org/view.php?id=CVE-2009-2348
Android 1.5 CRBxx allows local users to bypass the (1) Manifest.permission.CAMERA (aka android.permission.CAMERA) and (2) Manifest.permission.AUDIO_RECORD (aka android.permission.RECORD_AUDIO) configuration settings by installing and executing an application that does not make a permission request before using the camera or microphone. Android v1.5 CRBxx permite a a usuarios locales saltarse los valores de la configuración de (1) Manifest.permission.CAMERA (también conocido como android.permission.CAMERA) y (2) Manifest.permission.AUDIO_RECORD (tambien conocido como android.permission.RECORD_AUDIO) instalando y ejecutando una aplicación que no hace una petición de permiso para usar la cámara o el micrófono. • http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=4d8adefd35efdea849611b8b02d61f9517e47760 http://android.git.kernel.org/?p=platform/frameworks/base.git%3Ba=commit%3Bh=7b7225c8fdbead25235c74811b30ff4ee690dc58 http://android.git.kernel.org/?p=platform/packages/apps/Camera.git%3Ba=commit%3Bh=e655d54160e5a56d4909f2459eeae9012e9f187f http://www.ocert.org/advisories/ocert-2009-011.html http://www.openwall.com/lists/oss-security/2009/07/16/4 http://www.securityfocus.com/archive/1/505012/100/0 • CWE-94: Improper Control of Generation of Code ('Code Injection') •