1 results (0.005 seconds)

CVSS: 7.5EPSS: 8%CPEs: 2EXPL: 2

Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field. Desbordamiento de entero en el método BMP::readFromStream de la librería libsgl.so de Google Android SDK m3-rc37a y versiones anteriores, y m5-rc14, permite a atacantes remotos la ejecución de código de su elección a través de un fichero BMP manipulado con una cabecera que contiene un campo desplazamiento (offset) negativo. • https://www.exploit-db.com/exploits/31308 http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html http://securityreason.com/securityalert/3727 http://www.coresecurity.com/?action=item&id=2148 http://www.securityfocus.com/archive/1/489135/100/0/threaded http://www.securityfocus.com/bid/28006 https://exchange.xforce.ibmcloud.com/vulnerabilities/40999 • CWE-189: Numeric Errors •