7.5
CVSSv2

CVE-2008-0986

Published: 06/03/2008 Updated: 15/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and previous versions, and m5-rc14, allows remote malicious users to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.

Vulnerable Product Search on Vulmon Subscribe to Product

google android sdk m5-rc14

google android sdk

Vendor Advisories

Debian Bug report logs - #467652 vlc: CVE-2008-0984 arbitrary code execution via crafted mp4 file Package: vlc; Maintainer for vlc is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for vlc is src:vlc (PTS, buildd, popcon) Reported by: Axel Beckert <beckert@physethzch> Date: Tue, 26 Feb 2 ...

Exploits

source: wwwsecurityfocuscom/bid/28006/info Android Web Browser is prone to an integer-overflow vulnerability because it fails to adequately handle user-supplied data Attackers can exploit this issue to execute arbitrary code in the context of the application Failed exploit attempts will likely cause denial-of-service conditions This ...
Core Security Technologies Advisory - Google's Android SDK suffers from heap and integer overflow vulnerabilities Proof of concept code included ...