Page 92 of 995 results (0.006 seconds)

CVSS: 7.1EPSS: 1%CPEs: 23EXPL: 2

The GPS component in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows man-in-the-middle attackers to cause a denial of service (memory consumption, and device hang or reboot) via a large xtra.bin or xtra2.bin file on a spoofed Qualcomm gpsonextra.net or izatcloud.net host, aka internal bug 29555864. El componente GPS en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1, 6.x en versiones anteriores a 2016-10-01 y 7.0 en versiones anteriores a 2016-10-01 permite a atacantes man-in-the-middle provocar una denegación de servicio (consumo de memoria y cuelgue o reinicio del dispositivo) a través de un archivo xtra.bin o xtra2.bin grande en un anfitrión Qualcomm gpsonextra.net o izatcloud.net suplantado, vulnerabilidad también conocida como error interno 29555864. Android devices can be crashed remotely forcing a halt and then a soft reboot by a MITM attacker manipulating assisted GPS/GNSS data provided by Qualcomm. This issue affects the open source code in AOSP and proprietary code in a Java XTRA downloader provided by Qualcomm. The Android issue was fixed by in the October 2016 Android bulletin. • https://www.exploit-db.com/exploits/40502 http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93293 https://android.googlesource.com/platform/frameworks/base/+/218b813d5bc2d7d3952ea1861c38b4aa944ac59b https://code.google.com/p/android/issues/detail?id=213747 https://source.android.com/security/bulletin/2018-04-01 https://wwws.nightwatchcybersecurity.com/2016/10/04/advisory-cve-2016-5348-2 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

Binder in the kernel in Android before 2016-10-05 on Nexus devices allows attackers to obtain sensitive information via a crafted application, aka internal bug 30768347. El enlazador en el kernel en Android en versiones anteriores a 2016-10-05 en dispositivos Nexus permite a atacantes obtener información sensible a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 30768347. The interaction between the kernel /dev/binder and the usermode Parcel.cpp mean that when a binder object is passed as BINDER_TYPE_BINDER or BINDER_TYPE_WEAK_BINDER, a pointer to that object (in the server process) is leaked to the client process as the cookie value. This leads to a leak of a heap address in many of the privileged binder services, including system_server. • https://www.exploit-db.com/exploits/40515 http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93323 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

sound/soc/msm/qdsp6v2/msm-ds2-dap-config.c in a Qualcomm QDSP6v2 driver in Android before 2016-10-05 allows attackers to cause a denial of service or possibly have unspecified other impact via a large negative value for the data length, aka Qualcomm internal bug CR 1041130. sound/soc/msm/qdsp6v2/msm-ds2-dap-config.c en un controlador Qualcomm QDSP6v2 en Android en versiones anteriores a 2016-10-05 permite a atacantes provocar una denegación de servicio o tener otro posible impacto no especificado a través de un valor negativo grande para la longitud de datos, vulnerabilidad también conocida como error interno de Qualcomm CR 1041130. • http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93330 https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c3c9341bfdf93606983f893a086cb33a487306e5 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 23EXPL: 0

The SoftMPEG4 component in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 30033990. El componente SoftMPEG4 en libstagefright en mediaserver en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1, 6.x en versiones anteriores a 2016-10-01 y 7.0 en versiones anteriores a 2016-10-01 permite a atacantes obtener privilegios a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 30033990. • http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93296 https://android.googlesource.com/platform/frameworks/av/+/c48ef757cc50906e8726a3bebc3b60716292cdba https://android.googlesource.com/platform/frameworks/av/+/d4271b792bdad85a80e2b83ab34c4b30b74f53ec • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The NVIDIA profiler in Android before 2016-10-05 on Nexus 9 devices allows attackers to obtain sensitive information via a crafted application, aka internal bug 30163101. El generador de perfiles de NVIDIA en Android en versiones anteriores a 2016-10-05 en dispositivos Nexus 9 permite a atacantes obtener información sensible a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 30163101. • http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93324 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •