Page 174 of 1019 results (0.012 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The AppWidgetServiceImpl implementation in com/android/server/appwidget/AppWidgetServiceImpl.java in the Settings application in Android before 5.1.1 LMY48I allows attackers to obtain a URI permission via an application that sends an Intent with a (1) FLAG_GRANT_READ_URI_PERMISSION or (2) FLAG_GRANT_WRITE_URI_PERMISSION flag, as demonstrated by bypassing intended restrictions on reading contacts, aka internal bug 19618745. La implementación de AppWidgetServiceImpl en com/android/server/appwidget/AppWidgetServiceImpl.java en la aplicación Settings en Android en versiones anteriores a 5.1.1 LMY48I permite a atacantes obtener un permiso de URI a través de una aplicación que envía Intent con un indicador (1) FLAG_GRANT_READ_URI_PERMISSION o (2) FLAG_GRANT_WRITE_URI_PERMISSION, según lo demostrado eludiendo las restricciones destinadas a los contactos de lectura, también conocida como error interno 19618745. • https://android.googlesource.com/platform/frameworks/base/+/0b98d304c467184602b4c6bce76fda0b0274bc07 https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ • CWE-284: Improper Access Control •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

packages/Keyguard/res/layout/keyguard_password_view.xml in Lockscreen in Android 5.x before 5.1.1 LMY48M does not restrict the number of characters in the passwordEntry input field, which allows physically proximate attackers to bypass intended access restrictions via a long password that triggers a SystemUI crash, aka internal bug 22214934. packages/Keyguard/res/layout/keyguard_password_view.xml en Lockscreen en Android 5.x en versiones anteriores a 5.1.1 LMY48M no restringe el número de caracteres en el campo de entrada passwordEntry, lo que permite a atacantes próximos físicamente eludir las restricciones destinadas al acceso a través de una contraseña larga que desencadena una caída de SystemUI, también conocido como error interno 22214934. • http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-bypass https://android.googlesource.com/platform/frameworks/base/+/8fba7e6931245a17215e0e740e78b45f6b66d590 https://code.google.com/p/android/issues/detail?id=178139 https://groups.google.com/forum/message/raw?msg=android-security-updates/1M7qbSvACjo/Y7jewiW1AwAJ • CWE-284: Improper Access Control •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

The checkDestination function in internal/telephony/SMSDispatcher.java in Android before 5.1.1 LMY48M relies on an obsolete permission name for an authorization check, which allows attackers to bypass an intended user-confirmation requirement for SMS short-code messaging via a crafted application, aka internal bug 22314646. La función checkDestination en internal/telephony/SMSDispatcher.java en Android en versiones anteriores a 5.1.1 LMY48M confía en un nombre de permiso obsoleto para una comporbación de autorización, lo que permite a atacantes eludir un requisito destinado a la confirmación de usuario para enviar mensajes de código corto de SMS a través de una aplicación manipulada, también conocido como error interno 22314646. • https://android.googlesource.com/platform/frameworks/opt/telephony/+/df31d37d285dde9911b699837c351aed2320b586 https://groups.google.com/forum/message/raw?msg=android-security-updates/1M7qbSvACjo/Y7jewiW1AwAJ • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 95%CPEs: 1EXPL: 1

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. Desbordamiento de entero en la función SampleTable::setSampleToChunkParams en SampleTable.cpp en libstagefright en Android en versiones anteriores a 5.1.1 LMY48I, permite a atacantes remotos ejecutar código arbitrario a través de atoms manipulados en datos MP4 que desencadenan una multiplicación no comprobada, también conocida como error interno 20139950, un caso relacionado con CVE-2015-4496. Libstagefright integer overflow checks can be bypassed with extended chunk lengths. • https://www.exploit-db.com/exploits/38124 http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html http://www.huawei.com/en/psirt/security-advisories/hw-448928 http://www.securityfocus.com/bid/76052 http://www.securitytracker.com/id/1033094 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398 https://groups.google.com/forum/message/ra • CWE-189: Numeric Errors •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." Vulnerabilidad en las implementaciones (1) pipe_read y (2) pipe_write en fs/pipe.c en el kernel de Linux en versiones anteriores a 3.16, no considera correctamente los efectos secundarios de llamadas __copy_to_user_inatomic y __copy_from_user_inatomic fallidas, lo que permite a usuarios locales provocar una denegación de servicio (caída del sistema) o posiblemente obtener privilegios a través de una aplicación manipulada, también conocida como una 'saturación del array del vector I/O'. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. • https://github.com/panyu6325/CVE-2015-1805 https://github.com/ireshchaminda1/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=637b58c2887e5e57850865839cc75f59184b23d1 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f0d1bec9d58d4c038d0ac958c9af82be6eb18045 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html • CWE-17: DEPRECATED: Code •