// For flags

CVE-2016-2417

Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

media/libmedia/IOMX.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not initialize a parameter data structure, which allows attackers to obtain sensitive information from process memory, and consequently bypass an unspecified protection mechanism, via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26914474.

media/libmedia/IOMX.cpp en mediaserver en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1 y 6.x en versiones anteriores a 2016-04-01 no inicializa una estructura de datos de parámetros, lo que permite a atacantes obtener información sensible de memoria de procesos, y consecuentemente eludir un mecanismo de protección no especificado, a través de vectores no especificados, según lo demostrado por la obtención de acceso Signature o SignatureOrSystem, también conocida como error interno 26914474.

The GET_CONFIG and GET_PARAMETER calls on IOMX are vulnerable to an information disclosure of uninitialized heap memory. This could be used by an attacker to break ASLR in the media server process by reading out heap memory which contains useful address information.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-02-18 CVE Reserved
  • 2016-04-09 CVE Published
  • 2024-04-13 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.0
Search vendor "Google" for product "Android" and version "4.0"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.0.1
Search vendor "Google" for product "Android" and version "4.0.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.0.2
Search vendor "Google" for product "Android" and version "4.0.2"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.0.3
Search vendor "Google" for product "Android" and version "4.0.3"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.0.4
Search vendor "Google" for product "Android" and version "4.0.4"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.1
Search vendor "Google" for product "Android" and version "4.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.1.2
Search vendor "Google" for product "Android" and version "4.1.2"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.2
Search vendor "Google" for product "Android" and version "4.2"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.2.1
Search vendor "Google" for product "Android" and version "4.2.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.2.2
Search vendor "Google" for product "Android" and version "4.2.2"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.3
Search vendor "Google" for product "Android" and version "4.3"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.3.1
Search vendor "Google" for product "Android" and version "4.3.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.4
Search vendor "Google" for product "Android" and version "4.4"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.4.1
Search vendor "Google" for product "Android" and version "4.4.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.4.2
Search vendor "Google" for product "Android" and version "4.4.2"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
4.4.3
Search vendor "Google" for product "Android" and version "4.4.3"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.0
Search vendor "Google" for product "Android" and version "5.0"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.0.1
Search vendor "Google" for product "Android" and version "5.0.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.1
Search vendor "Google" for product "Android" and version "5.1"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
5.1.0
Search vendor "Google" for product "Android" and version "5.1.0"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
6.0
Search vendor "Google" for product "Android" and version "6.0"
-
Affected
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
6.0.1
Search vendor "Google" for product "Android" and version "6.0.1"
-
Affected