CVE-2016-3911
https://notcve.org/view.php?id=CVE-2016-3911
core/java/android/os/Process.java in Zygote in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 30143607. core/java/android/os/Process.java en Zygote en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1, 6.x en versiones anteriores a 2016-10-01 y 7.0 en versiones anteriores a 2016-10-01 permite a atacantes obtener privilegios a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 30143607. • http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93303 https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2016-3930
https://notcve.org/view.php?id=CVE-2016-3930
The NVIDIA MMC test driver in Android before 2016-10-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28760138. El controlador de test NVIDIA MMC en Android en versiones anteriores a 2016-10-05 en dispositivos Nexus 9 permite a atacantes obtener privilegios a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 28760138. • http://nvidia.custhelp.com/app/answers/detail/a_id/4561 http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93306 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2016-6678
https://notcve.org/view.php?id=CVE-2016-6678
The Motorola USBNet driver in Android before 2016-10-05 on Nexus 6 devices allows attackers to obtain sensitive information via a crafted application, aka internal bug 29914434. El controlador Motorola USBNet en Android en versiones anteriores a 2016-10-05 en dispositivos Nexus 6 permite a atacantes obtener información sensible a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 29914434. • http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93305 https://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2016-5348 – Google Android - 'gpsOneXtra' Data Files Denial of Service
https://notcve.org/view.php?id=CVE-2016-5348
The GPS component in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows man-in-the-middle attackers to cause a denial of service (memory consumption, and device hang or reboot) via a large xtra.bin or xtra2.bin file on a spoofed Qualcomm gpsonextra.net or izatcloud.net host, aka internal bug 29555864. El componente GPS en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1, 6.x en versiones anteriores a 2016-10-01 y 7.0 en versiones anteriores a 2016-10-01 permite a atacantes man-in-the-middle provocar una denegación de servicio (consumo de memoria y cuelgue o reinicio del dispositivo) a través de un archivo xtra.bin o xtra2.bin grande en un anfitrión Qualcomm gpsonextra.net o izatcloud.net suplantado, vulnerabilidad también conocida como error interno 29555864. Android devices can be crashed remotely forcing a halt and then a soft reboot by a MITM attacker manipulating assisted GPS/GNSS data provided by Qualcomm. This issue affects the open source code in AOSP and proprietary code in a Java XTRA downloader provided by Qualcomm. The Android issue was fixed by in the October 2016 Android bulletin. • https://www.exploit-db.com/exploits/40502 http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93293 https://android.googlesource.com/platform/frameworks/base/+/218b813d5bc2d7d3952ea1861c38b4aa944ac59b https://code.google.com/p/android/issues/detail?id=213747 https://source.android.com/security/bulletin/2018-04-01 https://wwws.nightwatchcybersecurity.com/2016/10/04/advisory-cve-2016-5348-2 • CWE-399: Resource Management Errors •
CVE-2016-6689 – Google Android - Binder Generic ASLR Leak
https://notcve.org/view.php?id=CVE-2016-6689
Binder in the kernel in Android before 2016-10-05 on Nexus devices allows attackers to obtain sensitive information via a crafted application, aka internal bug 30768347. El enlazador en el kernel en Android en versiones anteriores a 2016-10-05 en dispositivos Nexus permite a atacantes obtener información sensible a través de una aplicación manipulada, vulnerabilidad también conocida como error interno 30768347. The interaction between the kernel /dev/binder and the usermode Parcel.cpp mean that when a binder object is passed as BINDER_TYPE_BINDER or BINDER_TYPE_WEAK_BINDER, a pointer to that object (in the server process) is leaked to the client process as the cookie value. This leads to a leak of a heap address in many of the privileged binder services, including system_server. • https://www.exploit-db.com/exploits/40515 http://source.android.com/security/bulletin/2016-10-01.html http://www.securityfocus.com/bid/93323 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •