Page 395 of 2144 results (0.013 seconds)

CVSS: 10.0EPSS: 95%CPEs: 1EXPL: 1

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. Desbordamiento de entero en la función SampleTable::setSampleToChunkParams en SampleTable.cpp en libstagefright en Android en versiones anteriores a 5.1.1 LMY48I, permite a atacantes remotos ejecutar código arbitrario a través de atoms manipulados en datos MP4 que desencadenan una multiplicación no comprobada, también conocida como error interno 20139950, un caso relacionado con CVE-2015-4496. Libstagefright integer overflow checks can be bypassed with extended chunk lengths. • https://www.exploit-db.com/exploits/38124 http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html http://www.huawei.com/en/psirt/security-advisories/hw-448928 http://www.securityfocus.com/bid/76052 http://www.securitytracker.com/id/1033094 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398 https://groups.google.com/forum/message/ra • CWE-189: Numeric Errors •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." Vulnerabilidad en las implementaciones (1) pipe_read y (2) pipe_write en fs/pipe.c en el kernel de Linux en versiones anteriores a 3.16, no considera correctamente los efectos secundarios de llamadas __copy_to_user_inatomic y __copy_from_user_inatomic fallidas, lo que permite a usuarios locales provocar una denegación de servicio (caída del sistema) o posiblemente obtener privilegios a través de una aplicación manipulada, también conocida como una 'saturación del array del vector I/O'. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. • https://github.com/panyu6325/CVE-2015-1805 https://github.com/ireshchaminda1/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=637b58c2887e5e57850865839cc75f59184b23d1 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f0d1bec9d58d4c038d0ac958c9af82be6eb18045 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html • CWE-17: DEPRECATED: Code •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Mozilla Firefox before 38.0 on Android does not properly restrict writing URL data to the Android logging system, which allows attackers to obtain sensitive information via a crafted application that has a required permission for reading a log, as demonstrated by the READ_LOGS permission for the mixed-content violation log on Android 4.0 and earlier. Mozilla Firefox anterior a 38.0 en Android no restringe correctamente la escritura de datos de URLs en el sistema de registros de, lo que permite a atacantes obtener información sensible a través de una aplicación manipulada que tiene un permiso requerido para la lectura de un registro, tal y como fue demostrado por el permiso READ_LOGS para el registro de la violación de contenidos mixtos en Android 4.0 y anteriores. • http://www.mozilla.org/security/announce/2015/mfsa2015-52.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/74611 https://bugzilla.mozilla.org/show_bug.cgi?id=1149094 https://security.gentoo.org/glsa/201605-06 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in the doSendObjectInfo method in frameworks/av/media/mtp/MtpServer.cpp in Android 4.4.4 allows physically proximate attackers with a direct connection to the target Android device to upload files outside of the sdcard via a .. (dot dot) in a name parameter of an MTP request. Vulnerabilidad de directorio transversal en el método doSendObjectInfo en el archivo framework/av/media/mtp/MtpServer.cpp en Android 4.4.4 permite a atacantes físicamente próximos con una conexión directa al dispositivo Android objetivo subir archivos fuera de la tarjeta SD mediante un .. (punto punto) en un parámetro de una solicitud MTP. • http://packetstormsecurity.com/files/131509/Android-4.4-MTP-Path-Traversal.html http://seclists.org/fulldisclosure/2015/Apr/50 http://www.securityfocus.com/archive/1/535294/100/1100/threaded http://www.securityfocus.com/bid/74210 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 3

Directory traversal vulnerability in the Android debug bridge (aka adb) in Android 4.0.4 allows physically proximate attackers with a direct connection to the target Android device to write to arbitrary files owned by system via a .. (dot dot) in the tar archive headers. Una vulnerabilidad en Salto de Directorio en el puente de depuración de Android (también se conoce como adb) en Android versión 4.0.4, permite a atacantes físicamente próximos, con una conexión directa al dispositivo Android de destino, escribir en archivos arbitrarios propiedad del sistema por medio de un .. (punto punto) en los encabezados de archivo tar. The Android backup agent implementation was vulnerable to privilege escalation and race condition. • https://www.exploit-db.com/exploits/36813 http://packetstormsecurity.com/files/131510/ADB-Backup-Traversal-File-Overwrite.html http://seclists.org/fulldisclosure/2015/Apr/51 http://www.securityfocus.com/bid/74211 https://android.googlesource.com/platform/frameworks/base/+/7bc601d%5E%21/#F0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •